CVE-2020-36941
CRITICAL
2026-01-27
[email protected]
9.8
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Lifecycle Timeline
3
PoC Detected
Mar 24, 2026 - 21:24 vuln.today
Public exploit code
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
CVE Published
Jan 27, 2026 - 16:16 nvd
CRITICAL 9.8
Tags
Description
Knockpy 4.1.1 contains a CSV injection vulnerability that allows attackers to inject malicious formulas into CSV reports through unfiltered server headers. Attackers can manipulate server response headers to include spreadsheet formulas that will execute when the CSV is opened in spreadsheet applications.
Analysis
Knockpy 4.1.1 has CSV injection in subdomain scan exports.
Technical Context
CWE-1236.
Affected Products
['Knockpy 4.1.1']
Remediation
Update Knockpy. Sanitize CSV exports.
Priority Score
69
Low
Medium
High
Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: +20
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).