CVE-2023-53913
Published: 17 December 2025
Description
Rukovoditel 3.3.1 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into the firstname field. Attackers can craft payloads like =calc|a!z| to trigger code execution when an admin exports customer data as a CSV file.
Mitigating Controls (NIST 800-53 r5)AI
Filters firstname field content during CSV export to neutralize formula injection payloads like =calc|a!z| before transmission to spreadsheet applications.
Validates and sanitizes inputs to the firstname field to prevent storage of malicious formula elements by authenticated users.
Remediates the specific flaw in Rukovoditel 3.3.1 by patching the lack of sanitization in user input handling for CSV exports.
Security SummaryAI
CVE-2023-53913 is a CSV injection vulnerability in Rukovoditel version 3.3.1. The flaw resides in the firstname field, where authenticated users can inject malicious formulas, such as =calc|a!z|, without proper sanitization. It is classified under CWE-1236 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity due to its network reach, low complexity, and potential for significant impact.
An authenticated user with low privileges can exploit this by injecting a crafted payload into their firstname field during account creation or modification. The attack activates when an administrator exports customer data to a CSV file; upon opening the file in a spreadsheet application like Excel or LibreOffice, the injected formula executes arbitrary code on the administrator's local machine, potentially leading to full compromise.
Advisories and proof-of-concept exploits are documented in references including Exploit-DB (https://www.exploit-db.com/exploits/51490), a Vulncheck advisory on the issue (https://www.vulncheck.com/advisories/rukovoditel-csv-injection-via-user-account-export), and the vendor site (https://www.rukovoditel.net/). These resources detail the vulnerability but do not specify patch availability or mitigation steps in the provided information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CSV injection vulnerability in the web application (public-facing, AV:N/PR:L) enables low-privileged authenticated users to exploit it for privilege escalation (T1068, T1190) by injecting malicious formulas into exported CSV files, facilitating arbitrary code execution via user opening of the malicious file (T1204.002).