CVE-2025-11279

5.5 MEDIUM

📋 TL;DR

This CSV injection vulnerability in Axosoft Scrum and Bug Tracking allows attackers to inject malicious formulas into the Title field when adding work items. When exported to CSV and opened in spreadsheet applications like Excel, these formulas can execute commands or exfiltrate data. Organizations using Axosoft Scrum and Bug Tracking 22.1.1.11545 are affected.

💻 Affected Systems

Products:
  • Axosoft Scrum and Bug Tracking
Versions: 22.1.1.11545
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web interface's Add Work Item Page component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Data exfiltration, remote code execution on user workstations when malicious CSV files are opened, or corruption of exported data.

🟠

Likely Case

Data manipulation in exported reports, potential for phishing attacks using crafted CSV files, or denial of service through corrupted exports.

🟢

If Mitigated

Limited to data integrity issues in exported reports if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires user interaction (opening exported CSV file) but attack can be launched remotely against the web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor vendor communications for updates.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation to reject or sanitize CSV injection payloads in Title field.

CSV Export Sanitization

all

Add output encoding to escape formula characters (=, +, -, @) with single quotes in CSV exports.

🧯 If You Can't Patch

  • Restrict access to Add Work Item functionality to trusted users only
  • Implement web application firewall rules to block CSV injection payloads

🔍 How to Verify

Check if Vulnerable:

Test by entering CSV injection payloads like =cmd|' /C calc'!A0 in Title field and checking if they execute when exported to CSV and opened in Excel.

Check Version:

Check application version in admin interface or about page

Verify Fix Applied:

Verify that CSV injection payloads are properly sanitized or rejected in both input validation and CSV export output.

📡 Detection & Monitoring

Log Indicators:

  • Unusual characters in Title field inputs
  • Multiple failed validation attempts on Add Work Item Page

Network Indicators:

  • HTTP POST requests to Add Work Item endpoint containing CSV injection payloads

SIEM Query:

source="web_server" AND (uri="/addworkitem" OR uri="/workitem/add") AND (request_body CONTAINS "=" OR request_body CONTAINS "+" OR request_body CONTAINS "-" OR request_body CONTAINS "@")

🔗 References

📤 Share & Export