PatchSiren cyber security CVE debrief
CVE-2017-5992 Python CVE debrief
CVE-2017-5992 describes a server-side or desktop impact risk in workflows that parse untrusted Excel files with openpyxl 2.4.1. The issue is an XML external entity (XXE) weakness: a crafted .xlsx document can trigger external entity resolution and expose data or affect availability. Because exploitation depends on a user or process opening a malicious file, the practical risk is highest anywhere spreadsheet uploads or imports are accepted.
- Vendor
- Python
- Product
- CVE-2017-5992
- CVSS
- HIGH 8.2
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-15
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-15
- Advisory updated
- 2026-05-13
Who should care
Teams using Python applications with openpyxl to ingest .xlsx files, especially file-upload services, document processing pipelines, data import jobs, and any environment that may open spreadsheets from untrusted sources.
Technical summary
NVD maps the affected product as openpyxl 2.4.1 and identifies CWE-611. The reported behavior is that external entities are resolved by default when handling a crafted .xlsx document, which can lead to XXE outcomes. The CVSS vector provided by NVD is AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H, reflecting the need for user interaction and the potential for confidentiality and availability impact.
Defensive priority
High. Prioritize remediation if openpyxl is used to process attacker-controlled or externally sourced spreadsheets, or if spreadsheet uploads can reach automated back-end parsing.
Recommended defensive actions
- Verify whether your application or environment uses openpyxl 2.4.1 for .xlsx parsing.
- Apply the upstream fix referenced in the openpyxl issue and commit records, or upgrade to a non-vulnerable release confirmed by the project.
- Review spreadsheet ingestion paths to ensure untrusted files are not parsed with XML entity resolution enabled.
- Add safeguards for file-upload and import workflows, including allowlisting, sandboxing, and limiting who can submit spreadsheets.
- Monitor for unexpected outbound network access or file access from spreadsheet-processing components.
Evidence notes
The CVE record and NVD detail identify openpyxl 2.4.1 as vulnerable and classify the weakness as CWE-611. Supporting references in the record include an oss-security disclosure thread, an openpyxl commit, an openpyxl issue, and a Debian bug report. The CVE was published on 2017-02-15, and the NVD record was last modified on 2026-05-13. The supplied source corpus does not include a fixed version number, so remediation is phrased conservatively around the upstream fix and version verification.
Official resources
-
CVE-2017-5992 CVE record
CVE.org
-
CVE-2017-5992 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Third Party Advisory
Publicly disclosed in references dated 2017-02-07; CVE published on 2017-02-15. NVD record modified on 2026-05-13.