CVE-2025-60852
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-23

Last updated on: 2025-10-27

Assigner: MITRE

Description
A CSV Injection vulnerability existed in Instant Developer Foundation versions prior to 25.0.9600. Applications built with affected versions of the framework did not properly sanitize user-controlled input before including it in CSV exports. This issue could lead to code execution on the system where the exported CSV file is opened.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-23
Last Modified
2025-10-27
Generated
2026-05-07
AI Q&A
2025-10-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
instant_developer foundation *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1236 The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a CSV Injection (also known as Formula Injection) in Instant Developer Foundation versions prior to 25.0.9600. It occurs because the framework does not properly sanitize user-controlled input before including it in CSV exports. Specifically, input values starting with '+' or '-' are directly included in the CSV file without sanitization, causing spreadsheet software like Microsoft Excel or LibreOffice Calc to interpret them as formulas. This can lead to malicious code execution when the CSV file is opened. [1]


How can this vulnerability impact me? :

The vulnerability can lead to local code execution on the system where the exported CSV file is opened. For example, an attacker can craft input that triggers execution of commands via Excel's Dynamic Data Exchange (DDE) feature, such as launching applications like the Windows calculator. It can also enable data exfiltration through spreadsheet functions like HYPERLINK and unauthorized manipulation of spreadsheet data. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking exported CSV files from applications built with Instant Developer Foundation versions prior to 25.0.9600 for unsanitized user input starting with '+' or '-' characters that may be interpreted as formulas by spreadsheet software. A practical detection method is to export CSV files from the application and inspect them for such payloads. For example, you can use command-line tools like 'grep' to search for lines starting with '+' or '-' in CSV files: grep -E '^[+-]' exported_file.csv. Additionally, testing with the known payload '+CMD|' /C calc'!A0' in user input fields and then exporting and opening the CSV file in Excel (with DDE enabled) can confirm the vulnerability. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading the Instant Developer Foundation framework to version 25.0.9600 or later, where the vulnerability is fixed. Until the upgrade is possible, avoid opening CSV files exported from affected applications in spreadsheet software with DDE enabled, or disable DDE launch in Excel to prevent automatic execution of formulas. Additionally, sanitize or validate user input to ensure that values starting with '+' or '-' are properly escaped or quoted before inclusion in CSV exports. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart