Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-31672

Опубликовано: 09 апр. 2025
Источник: redhat
CVSS3: 4.4
EPSS Низкий

Описание

Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.

A flaw was found in Apache POI's poi-ooxml component. This vulnerability allows attackers to manipulate file parsing behavior via specially crafted OOXML files containing ZIP entries with duplicate file names. Different systems can interpret these files differently, leading to inconsistent data processing or security issues.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftpoi-ooxmlFix deferred
Red Hat build of Apicurio Registry 3poi-ooxmlFix deferred
Red Hat build of OptaPlanner 8poi-ooxmlFix deferred
Red Hat Fuse 7poi-ooxmlFix deferred
Red Hat Integration Camel K 1poi-ooxmlFix deferred
Red Hat JBoss Enterprise Application Platform 7poi-ooxmlFix deferred
Red Hat JBoss Enterprise Application Platform 8poi-ooxmlFix deferred
Red Hat JBoss Enterprise Application Platform Expansion Packpoi-ooxmlFix deferred
Red Hat Process Automation 7poi-ooxmlFix deferred
streams for Apache Kafkapoi-ooxmlFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2358619org.apache.poi/poi-ooxml: Apache POI: parsing OOXML based files (xlsx, docx, etc.), poi-ooxml could read unexpected data if underlying zip has duplicate zip entry names

EPSS

Процентиль: 42%
0.00199
Низкий

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
5 месяцев назад

Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.

CVSS3: 5.3
nvd
5 месяцев назад

Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.

CVSS3: 5.3
debian
5 месяцев назад

Improper Input Validation vulnerability in Apache POI. The issue affec ...

CVSS3: 5.3
github
5 месяцев назад

Apache POI OOXML Vulnerable to Improper Input Validation in OOXML File Parsing

EPSS

Процентиль: 42%
0.00199
Низкий

4.4 Medium

CVSS3