Loading
Generated remediation guidance and an executive summary. No account required.
A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected element is the function xlnt::detail::xlsx_consumer::read_office_document of the file source/detail/serialization/xlsx_consumer.cpp of the component XLSX File Parser. The manipulation leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used.
Use CWE-404, Xlnt-Community vendor hub and Xlnt product page to widen CVE-2026-3665 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-3664, CVE-2026-3663 and CVE-2026-3463 for nearby disclosures in the same product family.