Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23878: CWE-201: Insertion of Sensitive Information Into Sent Data in kohler hotcrp

0
Medium
VulnerabilityCVE-2026-23878cvecve-2026-23878cwe-201
Published: Mon Jan 19 2026 (01/19/2026, 18:08:41 UTC)
Source: CVE Database V5
Vendor/Project: kohler
Product: hotcrp

Description

HotCRP is conference review software. Starting in commit aa20ef288828b04550950cf67c831af8a525f508 and prior to commit ceacd5f1476458792c44c6a993670f02c984b4a0, authors with at least one submission on a HotCRP site could use the document API to download any documents (PDFs, attachments) associated with any submission. The problem was patched in commit ceacd5f1476458792c44c6a993670f02c984b4a0.

AI-Powered Analysis

AILast updated: 01/19/2026, 18:41:23 UTC

Technical Analysis

CVE-2026-23878 is a vulnerability classified under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting HotCRP, a widely used conference review software. The flaw exists in the document API, where authors who have at least one submission on a HotCRP site can exploit the API to download any documents associated with any submission, not limited to their own. This means an authenticated author can access PDFs and attachments belonging to other submissions, breaching confidentiality boundaries within the system. The vulnerability was introduced starting from commit aa20ef288828b04550950cf67c831af8a525f508 and was fixed in commit ceacd5f1476458792c44c6a993670f02c984b4a0. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges of an authenticated author, but no user interaction. The impact is high on confidentiality, with no effect on integrity or availability. No public exploits have been reported, but the vulnerability poses a significant risk to the confidentiality of sensitive academic and research documents managed by HotCRP. The patch should be applied immediately to prevent unauthorized document access.

Potential Impact

For European organizations, especially academic institutions, research bodies, and conference organizers using HotCRP, this vulnerability risks unauthorized disclosure of sensitive research papers, unpublished data, and confidential peer review documents. Such leakage can lead to intellectual property theft, reputational damage, and potential legal consequences under GDPR due to improper handling of sensitive personal or research data. The breach of confidentiality can undermine trust in the peer review process and academic integrity. Since HotCRP is used globally, European entities hosting conferences or managing submissions via HotCRP are directly impacted. The requirement for authenticated author privileges limits the attack surface but does not eliminate risk, as insider threats or compromised author accounts could exploit this flaw. The absence of known exploits in the wild suggests limited active exploitation but does not preclude targeted attacks.

Mitigation Recommendations

European organizations should immediately verify their HotCRP version and upgrade to the patched commit ceacd5f1476458792c44c6a993670f02c984b4a0 or later. If upgrading is not immediately possible, restrict author permissions and monitor document API access logs for unusual activity. Implement strict access controls and multi-factor authentication for author accounts to reduce risk of account compromise. Conduct regular audits of submission and document access patterns to detect anomalies. Educate users about the risk of credential theft and insider threats. Additionally, consider isolating HotCRP instances within secure network segments and applying web application firewalls with rules to detect abnormal API requests. Prompt patch management and vulnerability scanning should be part of ongoing security hygiene.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-16T21:02:02.900Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696e7765d302b072d9d13d54

Added to database: 1/19/2026, 6:26:45 PM

Last enriched: 1/19/2026, 6:41:23 PM

Last updated: 1/19/2026, 9:20:07 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats