FKIE_CVE-2026-25739
Vulnerability from fkie_nvd - Published: 2026-02-19 16:27 - Updated: 2026-02-26 02:56
Severity ?
Summary
Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Versions prior to 3.3.10 are vulnerable to cross-site scripting when uploading certain file types as materials. Users should upgrade to version 3.3.10 to receive a patch. To apply the fix itself updating is sufficient, but to benefit from the strict Content Security Policy (CSP) Indico now applies by default for file downloads, update the webserver config in case one uses nginx with Indico's `STATIC_FILE_METHOD` set to `xaccelredirect`. For further directions, consult the GitHub Security advisory or Indico setup documentation. Some workarounds are available. Use the webserver config to apply a strict CSP for material download endpoints, and/or only let trustworthy users create content (including material uploads, which speakers can typically do as well) on Indico.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cern:indico:*:*:*:*:*:*:*:*",
"matchCriteriaId": "386CCD17-7701-42CD-83A1-FEE910FDBBB3",
"versionEndExcluding": "3.3.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Versions prior to 3.3.10 are vulnerable to cross-site scripting when uploading certain file types as materials. Users should upgrade to version 3.3.10 to receive a patch. To apply the fix itself updating is sufficient, but to benefit from the strict Content Security Policy (CSP) Indico now applies by default for file downloads, update the webserver config in case one uses nginx with Indico\u0027s `STATIC_FILE_METHOD` set to `xaccelredirect`. For further directions, consult the GitHub Security advisory or Indico setup documentation. Some workarounds are available. Use the webserver config to apply a strict CSP for material download endpoints, and/or only let trustworthy users create content (including material uploads, which speakers can typically do as well) on Indico."
},
{
"lang": "es",
"value": "Indico es un sistema de gesti\u00f3n de eventos que utiliza Flask-Multipass, un sistema de autenticaci\u00f3n multi-backend para Flask. Las versiones anteriores a la 3.3.10 son vulnerables a cross-site scripting al subir ciertos tipos de archivos como materiales. Los usuarios deben actualizar a la versi\u00f3n 3.3.10 para recibir un parche. Para aplicar la correcci\u00f3n en s\u00ed, la actualizaci\u00f3n es suficiente, pero para beneficiarse de la estricta Pol\u00edtica de Seguridad de Contenido (CSP) que Indico ahora aplica por defecto para las descargas de archivos, actualice la configuraci\u00f3n del servidor web en caso de que se use nginx con el `STATIC_FILE_METHOD` de Indico configurado como `xaccelredirect`. Para obtener m\u00e1s indicaciones, consulte el aviso de seguridad de GitHub o la documentaci\u00f3n de configuraci\u00f3n de Indico. Algunas soluciones alternativas est\u00e1n disponibles. Utilice la configuraci\u00f3n del servidor web para aplicar una CSP estricta para los puntos finales de descarga de materiales, y/o solo permita que usuarios de confianza creen contenido (incluidas las subidas de materiales, que los ponentes tambi\u00e9n pueden hacer normalmente) en Indico."
}
],
"id": "CVE-2026-25739",
"lastModified": "2026-02-26T02:56:29.780",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-02-19T16:27:15.270",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/indico/indico/releases/tag/v3.3.10"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/indico/indico/security/advisories/GHSA-jxc4-54g3-j7vp"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…