Metrics
Affected Vendors & Products
Tue, 24 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cern
Cern indico |
|
| CPEs | cpe:2.3:a:cern:indico:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cern
Cern indico |
|
| Metrics |
cvssV3_1
|
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Indico
Indico indico |
|
| Vendors & Products |
Indico
Indico indico |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. In versions prior to 3.3.12, due to vulnerabilities in TeXLive and obscure LaTeX syntax that allowed circumventing Indico's LaTeX sanitizer, it is possible to use specially-crafted LaTeX snippets which can read local files or execute code with the privileges of the user running Indico on the server. Note that if server-side LaTeX rendering is not in use (ie `XELATEX_PATH` was not set in `indico.conf`), this vulnerability does not apply. It is recommended to update to Indico 3.3.12 as soon as possible. It is also strongly recommended to enable the containerized LaTeX renderer (using `podman`), which isolates it from the rest of the system. As a workaround, remove the `XELATEX_PATH` setting from `indico.conf` (or comment it out or set it to `None`) and restart the `indico-uwsgi` and `indico-celery` services to disable LaTeX functionality. | |
| Title | Indico discloses local files resulting in Remote Code Execution through LaTeX injection | |
| Weaknesses | CWE-22 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T13:42:19.688Z
Reserved: 2026-03-17T18:10:50.211Z
Link: CVE-2026-33046
Updated: 2026-03-24T13:42:16.058Z
Status : Analyzed
Published: 2026-03-23T23:17:12.520
Modified: 2026-03-24T21:51:13.703
Link: CVE-2026-33046
No data.