CVE-2026-25156

HotCRP is conference review software. HotCRP versions from October 2025 through January 2026 delivered documents of all types with inline Content-Disposition, causing them to be rendered in the user’s browser rather than downloaded. (The intended behavior was for only `text/plain`, `application/pdf`, `image/gif`, `image/jpeg`, and `image/png` to be delivered inline, though adding `save=0` to the document URL could request inline delivery for any document.) This made users who clicked a document link vulnerable to cross-site scripting attacks. An uploaded HTML or SVG document would run in the viewer’s browser with access to their HotCRP credentials, and Javascript in that document could eventually make arbitrary calls to HotCRP’s API. Malicious documents could be uploaded to submission fields with “file upload” or “attachment” type, or as attachments to comments. PDF upload fields were not vulnerable. A search of documents uploaded to hotcrp.com found no evidence of exploitation. The vulnerability was introduced in commit aa20ef288828b04550950cf67c831af8a525f508 (11 October 2025), present in development versions and v3.2, and fixed in commit 8933e86c9f384b356dc4c6e9e2814dee1074b323 and v3.2.1. Additionally, c3d88a7e18d52119c65df31c2cc994edd2beccc5 and v3.2.1 remove support for `save=0`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hotcrp:hotcrp:3.2:*:*:*:*:*:*:*

History

19 Feb 2026, 15:10

Type Values Removed Values Added
CPE cpe:2.3:a:hotcrp:hotcrp:3.2:*:*:*:*:*:*:*
First Time Hotcrp hotcrp
Hotcrp
References () https://github.com/kohler/hotcrp/commit/8933e86c9f384b356dc4c6e9e2814dee1074b323 - () https://github.com/kohler/hotcrp/commit/8933e86c9f384b356dc4c6e9e2814dee1074b323 - Patch
References () https://github.com/kohler/hotcrp/commit/aa20ef288828b04550950cf67c831af8a525f508 - () https://github.com/kohler/hotcrp/commit/aa20ef288828b04550950cf67c831af8a525f508 - Patch
References () https://github.com/kohler/hotcrp/commit/c3d88a7e18d52119c65df31c2cc994edd2beccc5 - () https://github.com/kohler/hotcrp/commit/c3d88a7e18d52119c65df31c2cc994edd2beccc5 - Patch
References () https://github.com/kohler/hotcrp/security/advisories/GHSA-p88p-2f2p-2476 - () https://github.com/kohler/hotcrp/security/advisories/GHSA-p88p-2f2p-2476 - Patch, Vendor Advisory
Summary
  • (es) HotCRP es un software de revisión de conferencias. Las versiones de HotCRP desde octubre de 2025 hasta enero de 2026 entregaron documentos de todo tipo con Content-Disposition en línea, haciendo que se renderizaran en el navegador del usuario en lugar de descargarse. (El comportamiento previsto era que solo 'text/plain', 'application/pdf', 'image/gif', 'image/jpeg' e 'image/png' se entregaran en línea, aunque añadir 'save=0' a la URL del documento podía solicitar la entrega en línea para cualquier documento.) Esto hizo que los usuarios que hacían clic en un enlace de documento fueran vulnerables a ataques de cross-site scripting. Un documento HTML o SVG subido se ejecutaría en el navegador del visor con acceso a sus credenciales de HotCRP, y Javascript en ese documento podría eventualmente hacer llamadas arbitrarias a la API de HotCRP. Los documentos maliciosos podían subirse a campos de envío con tipo 'carga de archivo' o 'adjunto', o como adjuntos a comentarios. Los campos de carga de PDF no eran vulnerables. Una búsqueda de documentos subidos a hotcrp.com no encontró evidencia de explotación. La vulnerabilidad fue introducida en el commit aa20ef288828b04550950cf67c831af8a525f508 (11 de octubre de 2025), presente en versiones de desarrollo y v3.2, y corregida en el commit 8933e86c9f384b356dc4c6e9e2814dee1074b323 y v3.2.1. Además, c3d88a7e18d52119c65df31c2cc994edd2beccc5 y v3.2.1 eliminan el soporte para 'save=0'.

30 Jan 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-30 23:16

Updated : 2026-02-19 15:10


NVD link : CVE-2026-25156

Mitre link : CVE-2026-25156

CVE.ORG link : CVE-2026-25156


JSON object : View

Products Affected

hotcrp

  • hotcrp
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')