Generated remediation guidance and an executive summary. No account required.
A vulnerability was found in xlnt-community xlnt up to 1.6.1. This issue affects the function xlnt::detail::compound_document_istreambuf::xsgetn of the file source/detail/cryptography/compound_document.cpp of the component XLSX File Parser. Performing a manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been made public and could be used. The patch is named 147. It is recommended to apply a patch to fix this issue.
Use CWE-119, Xlnt-Community vendor hub and Xlnt product page to widen CVE-2026-3663 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-3665, CVE-2026-3664 and CVE-2026-3463 for nearby disclosures in the same product family.