CVE-2025-8808

4.3 MEDIUM

📋 TL;DR

This CSV injection vulnerability in xujeff tianti 天梯 allows attackers to inject malicious formulas into exported CSV files. When users open these files in spreadsheet applications like Excel, the formulas can execute, potentially leading to data theft or system compromise. Organizations using tianti versions up to 2.3 are affected.

💻 Affected Systems

Products:
  • xujeff tianti 天梯
Versions: up to 2.3
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: All installations up to version 2.3 are vulnerable by default. The vulnerability exists in the exportOrder function of the admin module.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary commands on victim systems when users open malicious CSV files, leading to complete system compromise, data exfiltration, or ransomware deployment.

🟠

Likely Case

Attackers steal sensitive data from users' systems through formula execution, potentially capturing credentials, files, or other local information.

🟢

If Mitigated

With proper controls, the impact is limited to potential data leakage from individual user systems rather than server compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly disclosed. Attack requires user interaction (opening CSV file) but the injection itself can be performed remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider upgrading if newer versions exist or implement workarounds.

🔧 Temporary Workarounds

Sanitize CSV Output

all

Modify the exportOrder function to sanitize user input by prefixing formula cells with apostrophe or escaping special characters

Implement input validation in com.jeff.tianti.controller to escape =, +, -, @, and TAB characters

Disable Vulnerable Endpoint

all

Temporarily disable the /tianti-module-admin/user/ajax/save endpoint until patched

Configure web server or application to block access to the vulnerable endpoint

🧯 If You Can't Patch

  • Educate users to never open CSV files from untrusted sources in spreadsheet applications
  • Configure spreadsheet applications to disable automatic formula execution or open CSV files in plain text editors

🔍 How to Verify

Check if Vulnerable:

Test the exportOrder function by attempting to inject CSV formulas like =HYPERLINK() or =CMD|' and checking if they execute in exported files

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that injected formulas appear as plain text in exported CSV files rather than executing

📡 Detection & Monitoring

Log Indicators:

  • Unusual export requests to /tianti-module-admin/user/ajax/save
  • Large or frequent CSV exports

Network Indicators:

  • CSV downloads containing formula patterns (=, +, -, @, TAB) in content

SIEM Query:

source="/tianti-module-admin/user/ajax/save" AND (content="=" OR content="+" OR content="-" OR content="@")

🔗 References

📤 Share & Export