CVE-2025-12249

6.3 MEDIUM

📋 TL;DR

This CSV injection vulnerability in Axosoft Scrum and Bug Tracking allows attackers to inject malicious formulas into ticket titles, which could execute when exported to CSV files. The vulnerability affects version 22.1.1.11545 and can be exploited remotely. Organizations using this specific version are at risk.

💻 Affected Systems

Products:
  • Axosoft Scrum and Bug Tracking
Versions: 22.1.1.11545
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Edit Ticket Page component. All deployments with this version are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary commands on victim systems when users open malicious CSV exports, potentially leading to data theft, system compromise, or ransomware deployment.

🟠

Likely Case

Attackers inject malicious formulas that execute when exported CSV files are opened in spreadsheet applications, potentially stealing credentials or executing unwanted commands.

🟢

If Mitigated

With proper input validation and output encoding, CSV exports would sanitize malicious content, preventing formula execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are public but no proof-of-concept code is confirmed. Attack requires user interaction (opening CSV file).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NONE

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider upgrading to newer versions if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation for Ticket Titles

all

Implement server-side validation to reject or sanitize CSV injection characters (=, +, -, @, |) in ticket titles.

CSV Export Sanitization

all

Modify CSV export functionality to prepend apostrophes to formula-like entries or encode special characters.

🧯 If You Can't Patch

  • Disable CSV export functionality for untrusted users
  • Educate users to never open CSV files from untrusted sources in spreadsheet applications

🔍 How to Verify

Check if Vulnerable:

Check if running Axosoft version 22.1.1.11545. Attempt to create ticket with title starting with =, +, -, @, or | and export to CSV.

Check Version:

Check application version in About section or configuration files

Verify Fix Applied:

Test that CSV exports properly sanitize formula characters by checking exported files for prepended apostrophes or encoded content.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ticket title entries containing formula characters
  • Multiple CSV export requests from single user

Network Indicators:

  • CSV file downloads containing suspicious content

SIEM Query:

source="axosoft" AND (title="=*" OR title="+*" OR title="-*" OR title="@*" OR title="|*")

🔗 References

📤 Share & Export