Overview
Spreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings within the Excel parsing logic.
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://metacpan.org/dist/Spreadsheet-ParseExcel and Barracuda's specific implementation and fix for their downstream issue CVE-2023-7102 at https://www.barracuda.com/company/legal/esg-vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2023-7101
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2023-7101 |
| Vendor / Product | Spreadsheet::ParseExcel — Spreadsheet::ParseExcel |
| NVD Published | 2023-12-24 |
| NVD Last Modified | 2025-10-24 |
| CVSS 3.1 Score | 7.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-95 |
| CISA KEV Added | 2024-01-02 |
| CISA KEV Deadline | 2024-01-23 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2024-01-23.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2024-01-02 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2024-01-23 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2023-7101 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |