Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Starting in version 2.2 and prior to version 3.3.7, an endpoint used to display details of users listed in certain fields (such as ACLs) could be misused to dump basic user details (such as name, affiliation and email) in bulk. Version 3.3.7 fixes the issue. Owners of instances that allow everyone to create a user account, who wish to truly restrict access to these user details, should consider restricting user search to managers. As a workaround, it is possible to restrict access to the affected endpoints (e.g. in the webserver config), but doing so would break certain form fields which could no longer show the details of the users listed in those fields, so upgrading instead is highly recommended.
References
Link | Resource |
---|---|
https://docs.getindico.io/en/stable/config/settings/#ALLOW_PUBLIC_USER_SEARCH | Product |
https://docs.getindico.io/en/stable/installation/upgrade | Product |
https://github.com/indico/indico/releases/tag/v3.3.7 | Release Notes |
https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj | Vendor Advisory |
https://www.vicarius.io/vsociety/posts/cve202553640-detect-indico-vulnerability | Exploit Third Party Advisory |
https://www.vicarius.io/vsociety/posts/cve202553640-mitigate-indico-vulnerability | Exploit Mitigation Third Party Advisory |
Configurations
History
15 Sep 2025, 18:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cern indico
Cern |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:a:cern:indico:*:*:*:*:*:*:*:* | |
References | () https://docs.getindico.io/en/stable/config/settings/#ALLOW_PUBLIC_USER_SEARCH - Product | |
References | () https://docs.getindico.io/en/stable/installation/upgrade - Product | |
References | () https://github.com/indico/indico/releases/tag/v3.3.7 - Release Notes | |
References | () https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj - Vendor Advisory | |
References | () https://www.vicarius.io/vsociety/posts/cve202553640-detect-indico-vulnerability - Exploit, Third Party Advisory | |
References | () https://www.vicarius.io/vsociety/posts/cve202553640-mitigate-indico-vulnerability - Exploit, Mitigation, Third Party Advisory |
22 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Jul 2025, 13:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Jul 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-14 21:15
Updated : 2025-09-15 18:55
NVD link : CVE-2025-53640
Mitre link : CVE-2025-53640
CVE.ORG link : CVE-2025-53640
JSON object : View
Products Affected
cern
- indico