CVE-2026-25739

Source
https://cve.org/CVERecord?id=CVE-2026-25739
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25739.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25739
Aliases
Published
2026-02-19T15:39:32.554Z
Modified
2026-02-22T00:39:49.813583Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Indico affected by Cross-Site-Scripting via material uploads
Details

Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Versions prior to 3.3.10 are vulnerable to cross-site scripting when uploading certain file types as materials. Users should upgrade to version 3.3.10 to receive a patch. To apply the fix itself updating is sufficient, but to benefit from the strict Content Security Policy (CSP) Indico now applies by default for file downloads, update the webserver config in case one uses nginx with Indico's STATIC_FILE_METHOD set to xaccelredirect. For further directions, consult the GitHub Security advisory or Indico setup documentation. Some workarounds are available. Use the webserver config to apply a strict CSP for material download endpoints, and/or only let trustworthy users create content (including material uploads, which speakers can typically do as well) on Indico.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25739.json",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/indico/indico

Affected ranges

Type
GIT
Repo
https://github.com/indico/indico
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.97-rc1
v0.97-rc2
v0.97.0
v0.97b
v0.97b2
v0.98-rc1
v0.98.1
v0.98.2
v0.98.3
v0.99.0
v1.*
v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.1.2-latest
v1.2.0
v1.9.1
v1.9.11.dev10
v1.9.11.dev11
v1.9.11.dev12
v1.9.11.dev13
v1.9.11.dev14
v1.9.11.dev15
v1.9.11.dev16
v1.9.11.dev17
v1.9.11.dev18
v1.9.11.dev3
v1.9.11.dev6
v1.9.11.dev7
v1.9.11.dev8
v1.9.11.dev9
v1.9.3
v1.9.4
v1.9.5
v1.9.6
v1.9.7
v1.9.9
v2.*
v2.0
v2.0.1
v2.0.2
v2.0.3
v2.0a1
v2.0rc1
v2.0rc2
v2.1
v2.1.1
v2.1.10
v2.1.11
v2.1.2
v2.1.3
v2.1.4
v2.1.5
v2.1.6
v2.1.7
v2.1.7+docs
v2.1.8
v2.1.9
v2.1a1
v2.1a2
v2.1a3
v2.1b1
v2.1rc1
v2.1rc2
v2.1rc3
v2.1rc4
v2.1rc5
v2.1rc6
v2.2
v2.2+docs
v2.2.1
v2.2.2
v2.2.3
v2.2.4
v2.2.5
v2.2.6
v2.2.7
v2.2.8
v2.2.8+archived
v2.3
v2.3.1
v2.3.2
v2.3.3
v2.3.4
v2.3.5
v2.3.5+archived
v3.*
v3.0
v3.0.1
v3.0.2
v3.0.3
v3.0.3+archived
v3.0rc1
v3.0rc2
v3.1
v3.1.1
v3.1.1+archived
v3.2
v3.2.1
v3.2.2
v3.2.3
v3.2.4
v3.2.5
v3.2.6
v3.2.6+docs
v3.2.7
v3.2.8
v3.2.9
v3.3
v3.3.1
v3.3.2
v3.3.3
v3.3.4
v3.3.5
v3.3.6
v3.3.7
v3.3.8
v3.3.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25739.json"