Indico vulnerable to user enumeration via API endpoint
Description
Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Starting in version 2.2 and prior to version 3.3.7, an endpoint used to display details of users listed in certain fields (such as ACLs) could be misused to dump basic user details (such as name, affiliation and email) in bulk. Version 3.3.7 fixes the issue. Owners of instances that allow everyone to create a user account, who wish to truly restrict access to these user details, should consider restricting user search to managers. As a workaround, it is possible to restrict access to the affected endpoints (e.g. in the webserver config), but doing so would break certain form fields which could no longer show the details of the users listed in those fields, so upgrading instead is highly recommended.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
indicoPyPI | >= 2.2, < 3.3.7 | 3.3.7 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-q28v-664f-q6wjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53640ghsaADVISORY
- docs.getindico.io/en/stable/config/settings/ghsax_refsource_MISCWEB
- docs.getindico.io/en/stable/installation/upgradeghsax_refsource_MISCWEB
- github.com/indico/indico/pull/6936/commits/f8583557a3da56aeea8857ae69bf17c9066c95c1ghsaWEB
- github.com/indico/indico/releases/tag/v3.3.7ghsax_refsource_MISCWEB
- github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wjghsax_refsource_CONFIRMWEB
- www.vicarius.io/vsociety/posts/cve202553640-detect-indico-vulnerabilityghsaWEB
- www.vicarius.io/vsociety/posts/cve202553640-mitigate-indico-vulnerabilityghsaWEB
News mentions
0No linked articles in our index yet.