Hi Snuwerd,
to exploit this vulnerability an attacker only needs access to any form that will be saved to the db and then exported as an excel file and downloaded.
The excel file will then execute the potentially malicous code on the computer of the person who opens the excel file.