Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 18 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | CSV Export Malformed Data Leading to Embedded Code Execution |
Wed, 04 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Six Apart
Six Apart movable Type Six Apart Ltd Six Apart Ltd movable Type |
|
| Vendors & Products |
Six Apart
Six Apart movable Type Six Apart Ltd Six Apart Ltd movable Type |
Wed, 04 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If a malformed data is input to the affected product, a CSV file downloaded from the affected product may contain such malformed data. When a victim user download and open such a CSV file, the embedded code may be executed in the user's environment. Note that Movable Type 7 series and 8.4 series, which are End-of-Life (EOL), are affected by the vulnerability as well. | |
| Weaknesses | CWE-1236 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-02-04T15:55:26.690Z
Reserved: 2026-01-29T02:02:27.800Z
Link: CVE-2026-24447
Updated: 2026-02-04T15:55:22.739Z
Status : Deferred
Published: 2026-02-04T07:16:01.560
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-24447
No data.
OpenCVE Enrichment
Updated: 2026-04-18T18:45:05Z