Vulnerability Description
Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Versions prior to 3.3.10 are vulnerable to cross-site scripting when uploading certain file types as materials. Users should upgrade to version 3.3.10 to receive a patch. To apply the fix itself updating is sufficient, but to benefit from the strict Content Security Policy (CSP) Indico now applies by default for file downloads, update the webserver config in case one uses nginx with Indico's `STATIC_FILE_METHOD` set to `xaccelredirect`. For further directions, consult the GitHub Security advisory or Indico setup documentation. Some workarounds are available. Use the webserver config to apply a strict CSP for material download endpoints, and/or only let trustworthy users create content (including material uploads, which speakers can typically do as well) on Indico.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cern | Indico | < 3.3.10 |
Related Weaknesses (CWE)
References
- https://github.com/indico/indico/releases/tag/v3.3.10Release Notes
- https://github.com/indico/indico/security/advisories/GHSA-jxc4-54g3-j7vpPatchVendor Advisory
FAQ
What is CVE-2026-25739?
CVE-2026-25739 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Versions prior to 3.3.10 are vulnerable to cross-site scripting when uploading certain ...
How severe is CVE-2026-25739?
CVE-2026-25739 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25739?
Check the references section above for vendor advisories and patch information. Affected products include: Cern Indico.