Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rukovoditel:rukovoditel:3.3:*:*:*:*:*:*:* |
Wed, 24 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rukovoditel:rukovoditel:3.3.1:*:*:*:*:*:*:* |
Thu, 18 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rukovoditel
Rukovoditel rukovoditel |
|
| Vendors & Products |
Rukovoditel
Rukovoditel rukovoditel |
Wed, 17 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rukovoditel 3.3.1 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into the firstname field. Attackers can craft payloads like =calc|a!z| to trigger code execution when an admin exports customer data as a CSV file. | |
| Title | Rukovoditel 3.3.1 CSV Injection via User Account Export | |
| Weaknesses | CWE-1236 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:07:33.725Z
Reserved: 2025-12-16T19:22:09.995Z
Link: CVE-2023-53913
Updated: 2025-12-18T14:50:31.408Z
Status : Analyzed
Published: 2025-12-17T23:15:49.830
Modified: 2025-12-24T17:55:18.900
Link: CVE-2023-53913
No data.
OpenCVE Enrichment
Updated: 2025-12-18T09:55:49Z