Cyber Posture

CVE-2020-36962

CriticalPublic PoC

Published: 28 January 2026

Published
28 January 2026
Modified
02 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0027 50.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-36962 is a critical-severity Improper Neutralization of Formula Elements in a CSV File (CWE-1236) vulnerability in Tendenci Tendenci. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 49.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents formula injection by validating and sanitizing user inputs in the contact form message field to block malicious payloads like '=10+20+cmd|/C calc!A0'.

prevent

SI-15 filters outputs during CSV export to encode or escape message field content, preventing spreadsheet applications from interpreting injected formulas as executable commands.

prevent

SI-2 mandates identification, reporting, testing, and correction of the specific flaw in Tendenci 12.3.1, eliminating the CSV formula injection vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Unauthenticated exploitation of public-facing web application contact form (T1190) injects malicious formulas into CSV exports, enabling user execution via malicious file when opened in spreadsheet applications (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Tendenci 12.3.1 contains a CSV formula injection vulnerability in the contact form message field that allows attackers to inject malicious formulas during export. Attackers can submit crafted payloads like '=10+20+cmd|' /C calc'!A0' in the message field to trigger arbitrary command…

more

execution when the CSV is opened in spreadsheet applications.

Deeper analysisAI

CVE-2020-36962 is a CSV formula injection vulnerability in Tendenci 12.3.1, specifically within the contact form message field. Attackers can inject malicious formulas into submitted messages, which are then included in exported CSV files. When these files are opened in spreadsheet applications, the formulas can execute. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-1236.

Unauthenticated remote attackers can exploit this issue by submitting crafted payloads, such as '=10+20+cmd|/C calc!A0', through the contact form. If a site administrator exports the form data to CSV and subsequently opens the file in a compatible spreadsheet program, the payload triggers arbitrary command execution on the administrator's system, resulting in high impacts to confidentiality, integrity, and availability.

Advisories and references, including the Vulncheck advisory at https://www.vulncheck.com/advisories/tendenci-csv-formula-injection and an exploit at https://www.exploit-db.com/exploits/49145, provide additional details. The Tendenci GitHub repository (https://github.com/tendenci/tendenci) and official site (https://www.tendenci.com/) offer resources for further investigation into patches or mitigations. The CVE was published on 2026-01-28T18:16:46.277.

Details

CWE(s)

Affected Products

tendenci
tendenci
12.3.1

CVEs Like This One

CVE-2025-55745Shared CWE-1236
CVE-2024-45084Shared CWE-1236
CVE-2026-35157Shared CWE-1236
CVE-2023-53913Shared CWE-1236
CVE-2024-55532Shared CWE-1236
CVE-2025-50572Shared CWE-1236
CVE-2023-46400Shared CWE-1236
CVE-2025-56267Shared CWE-1236
CVE-2023-46401Shared CWE-1236
CVE-2026-23873Shared CWE-1236

References