CVE-2025-53640

Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Starting in version 2.2 and prior to version 3.3.7, an endpoint used to display details of users listed in certain fields (such as ACLs) could be misused to dump basic user details (such as name, affiliation and email) in bulk. Version 3.3.7 fixes the issue. Owners of instances that allow everyone to create a user account, who wish to truly restrict access to these user details, should consider restricting user search to managers. As a workaround, it is possible to restrict access to the affected endpoints (e.g. in the webserver config), but doing so would break certain form fields which could no longer show the details of the users listed in those fields, so upgrading instead is highly recommended.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cern:indico:*:*:*:*:*:*:*:*

History

15 Sep 2025, 18:55

Type Values Removed Values Added
CPE cpe:2.3:a:cern:indico:*:*:*:*:*:*:*:*
References () https://docs.getindico.io/en/stable/config/settings/#ALLOW_PUBLIC_USER_SEARCH - () https://docs.getindico.io/en/stable/config/settings/#ALLOW_PUBLIC_USER_SEARCH - Product
References () https://docs.getindico.io/en/stable/installation/upgrade - () https://docs.getindico.io/en/stable/installation/upgrade - Product
References () https://github.com/indico/indico/releases/tag/v3.3.7 - () https://github.com/indico/indico/releases/tag/v3.3.7 - Release Notes
References () https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj - () https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj - Vendor Advisory
References () https://www.vicarius.io/vsociety/posts/cve202553640-detect-indico-vulnerability - () https://www.vicarius.io/vsociety/posts/cve202553640-detect-indico-vulnerability - Exploit, Third Party Advisory
References () https://www.vicarius.io/vsociety/posts/cve202553640-mitigate-indico-vulnerability - () https://www.vicarius.io/vsociety/posts/cve202553640-mitigate-indico-vulnerability - Exploit, Mitigation, Third Party Advisory
First Time Cern indico
Cern
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

22 Jul 2025, 16:15

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/cve202553640-detect-indico-vulnerability -
  • () https://www.vicarius.io/vsociety/posts/cve202553640-mitigate-indico-vulnerability -

15 Jul 2025, 13:14

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-14 21:15

Updated : 2025-09-15 18:55


NVD link : CVE-2025-53640

Mitre link : CVE-2025-53640

CVE.ORG link : CVE-2025-53640


JSON object : View

Products Affected

cern

  • indico
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-639

Authorization Bypass Through User-Controlled Key

CWE-862

Missing Authorization