<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Csv-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/csv-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:16:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/csv-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>ERPGo SaaS 3.9 CSV Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-erpgo-csv-injection/</link><pubDate>Tue, 05 May 2026 12:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-erpgo-csv-injection/</guid><description>ERPGo SaaS version 3.9 is vulnerable to CSV injection, allowing authenticated attackers to execute arbitrary code by injecting malicious formulas into the vendor name field during vendor creation, which are then executed when the exported CSV file is opened in a spreadsheet application.</description><content:encoded><![CDATA[<p>ERPGo SaaS 3.9 is susceptible to a CSV injection vulnerability that allows authenticated attackers to inject arbitrary code. The vulnerability stems from the insufficient sanitization of input provided in the vendor name field during vendor creation. By injecting malicious formulas, such as <code>=10+20+cmd|' /C calc'!A0</code>, attackers can achieve arbitrary code execution when a user opens the exported CSV file in a spreadsheet application. This vulnerability poses a significant risk to organizations using ERPGo SaaS 3.9, as it could lead to unauthorized access, data compromise, and further exploitation of the system. The vulnerability was reported on May 5, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the ERPGo SaaS 3.9 application.</li>
<li>The attacker navigates to the vendor creation form.</li>
<li>In the &ldquo;vendor name&rdquo; field, the attacker injects a malicious CSV formula, such as <code>=10+20+cmd|' /C calc'!A0</code>.</li>
<li>The attacker submits the form, creating a new vendor entry with the malicious payload.</li>
<li>An authorized user exports vendor data to a CSV file.</li>
<li>The user opens the exported CSV file using a spreadsheet application like Microsoft Excel or LibreOffice Calc.</li>
<li>The spreadsheet application interprets and executes the injected formula.</li>
<li>The attacker achieves arbitrary code execution on the user&rsquo;s system, potentially leading to further compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CSV injection vulnerability allows an attacker to execute arbitrary code on the system of the user opening the exported CSV file. This could lead to the installation of malware, data exfiltration, or further compromise of the internal network. Given the widespread use of spreadsheet applications, a single successful injection could affect multiple users and systems. The potential for data compromise and system takeover makes this a high-severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CSV Injection via Formula in Process Creation</code> to your SIEM to identify potential exploitation attempts based on spawned processes (process_creation logs).</li>
<li>Deploy the Sigma rule <code>Detect CSV Injection via Formula in File Content</code> to your SIEM to identify potentially crafted CSV files based on file content analysis (file_event logs).</li>
<li>Upgrade to a patched version of ERPGo SaaS that addresses this vulnerability; consult the vendor&rsquo;s security advisories for updates.</li>
<li>Educate users about the risks of opening CSV files from untrusted sources and the potential for CSV injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>csv-injection</category><category>code-execution</category><category>web-application</category></item></channel></rss>