We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53640

Indico vulnerable to user enumeration via API endpoint



Description

Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Starting in version 2.2 and prior to version 3.3.7, an endpoint used to display details of users listed in certain fields (such as ACLs) could be misused to dump basic user details (such as name, affiliation and email) in bulk. Version 3.3.7 fixes the issue. Owners of instances that allow everyone to create a user account, who wish to truly restrict access to these user details, should consider restricting user search to managers. As a workaround, it is possible to restrict access to the affected endpoints (e.g. in the webserver config), but doing so would break certain form fields which could no longer show the details of the users listed in those fields, so upgrading instead is highly recommended.

Reserved 2025-07-07 | Published 2025-07-14 | Updated 2025-07-14 | Assigner GitHub_M


MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-639: Authorization Bypass Through User-Controlled Key

CWE-862: Missing Authorization

Product status

>= 2.2, < 3.3.7
affected

References

github.com/...indico/security/advisories/GHSA-q28v-664f-q6wj

docs.getindico.io/en/stable/config/settings/

docs.getindico.io/en/stable/installation/upgrade

github.com/indico/indico/releases/tag/v3.3.7

cve.org (CVE-2025-53640)

nvd.nist.gov (CVE-2025-53640)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53640

Support options

Helpdesk Chat, Email, Knowledgebase