CVE-2025-12249
📋 TL;DR
This CSV injection vulnerability in Axosoft Scrum and Bug Tracking allows attackers to inject malicious formulas into ticket titles, which could execute when exported to CSV files. The vulnerability affects version 22.1.1.11545 and can be exploited remotely. Organizations using this specific version are at risk.
💻 Affected Systems
- Axosoft Scrum and Bug Tracking
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could execute arbitrary commands on victim systems when users open malicious CSV exports, potentially leading to data theft, system compromise, or ransomware deployment.
Likely Case
Attackers inject malicious formulas that execute when exported CSV files are opened in spreadsheet applications, potentially stealing credentials or executing unwanted commands.
If Mitigated
With proper input validation and output encoding, CSV exports would sanitize malicious content, preventing formula execution.
🎯 Exploit Status
Exploit details are public but no proof-of-concept code is confirmed. Attack requires user interaction (opening CSV file).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: UNKNOWN
Vendor Advisory: NONE
Restart Required: No
Instructions:
No official patch available. Vendor has not responded to disclosure. Consider upgrading to newer versions if available or implementing workarounds.
🔧 Temporary Workarounds
Input Validation for Ticket Titles
allImplement server-side validation to reject or sanitize CSV injection characters (=, +, -, @, |) in ticket titles.
CSV Export Sanitization
allModify CSV export functionality to prepend apostrophes to formula-like entries or encode special characters.
🧯 If You Can't Patch
- Disable CSV export functionality for untrusted users
- Educate users to never open CSV files from untrusted sources in spreadsheet applications
🔍 How to Verify
Check if Vulnerable:
Check if running Axosoft version 22.1.1.11545. Attempt to create ticket with title starting with =, +, -, @, or | and export to CSV.
Check Version:
Check application version in About section or configuration files
Verify Fix Applied:
Test that CSV exports properly sanitize formula characters by checking exported files for prepended apostrophes or encoded content.
📡 Detection & Monitoring
Log Indicators:
- Unusual ticket title entries containing formula characters
- Multiple CSV export requests from single user
Network Indicators:
- CSV file downloads containing suspicious content
SIEM Query:
source="axosoft" AND (title="=*" OR title="+*" OR title="-*" OR title="@*" OR title="|*")