CVE-2025-53640

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-53640
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53640.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-53640
Aliases
Published
2025-07-14T20:14:27Z
Modified
2025-11-09T19:54:57.873400Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N CVSS Calculator
Summary
Indico vulnerable to user enumeration via API endpoint
Details

Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Starting in version 2.2 and prior to version 3.3.7, an endpoint used to display details of users listed in certain fields (such as ACLs) could be misused to dump basic user details (such as name, affiliation and email) in bulk. Version 3.3.7 fixes the issue. Owners of instances that allow everyone to create a user account, who wish to truly restrict access to these user details, should consider restricting user search to managers. As a workaround, it is possible to restrict access to the affected endpoints (e.g. in the webserver config), but doing so would break certain form fields which could no longer show the details of the users listed in those fields, so upgrading instead is highly recommended.

Database specific
{
    "cwe_ids": [
        "CWE-200",
        "CWE-639",
        "CWE-862"
    ]
}
References

Affected packages

Git / github.com/indico/indico

Affected ranges

Type
GIT
Repo
https://github.com/indico/indico
Events

Affected versions

v2.*

v2.1.10
v2.1.11
v2.1.9
v2.2+docs
v2.2.1
v2.2.2
v2.2.3
v2.2.4
v2.2.5
v2.2.6
v2.2.7
v2.2.8
v2.2.8+archived
v2.3
v2.3.1
v2.3.2
v2.3.3
v2.3.4
v2.3.5
v2.3.5+archived

v3.*

v3.0
v3.0.1
v3.0.2
v3.0.3
v3.0.3+archived
v3.0rc1
v3.0rc2
v3.1
v3.1.1
v3.1.1+archived
v3.2
v3.2.1
v3.2.2
v3.2.3
v3.2.4
v3.2.5
v3.2.6
v3.2.6+docs
v3.2.7
v3.2.8
v3.2.9
v3.3
v3.3.1
v3.3.2
v3.3.3
v3.3.4
v3.3.5
v3.3.6