CVE-2020-36962

CRITICAL
2026-01-28 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Feb 02, 2026 - 19:13 vuln.today
Public exploit code
CVE Published
Jan 28, 2026 - 18:16 nvd
CRITICAL 9.8

Description

Tendenci 12.3.1 contains a CSV formula injection vulnerability in the contact form message field that allows attackers to inject malicious formulas during export. Attackers can submit crafted payloads like '=10+20+cmd|' /C calc'!A0' in the message field to trigger arbitrary command execution when the CSV is opened in spreadsheet applications.

Analysis

Tendenci 12.3.1 has a CSV formula injection in the contact form message field enabling code execution when administrators export and open data in spreadsheet applications.

Technical Context

Tendenci 12.3.1 fails to sanitize contact form submissions for CSV formula characters (CWE-1236). When administrators export contact data to CSV and open it in Excel, injected formulas execute.

Affected Products

['Tendenci 12.3.1']

Remediation

Update Tendenci. Prefix CSV cells containing = + - @ with a single quote during export.

Priority Score

69
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +49
POC: +20

Share

CVE-2020-36962 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy