CVE-2026-25156: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kohler hotcrp
CVE-2026-25156 is a high-severity cross-site scripting (XSS) vulnerability in HotCRP conference review software version 3. 2, introduced in October 2025 and fixed in version 3. 2. 1. The flaw arises because HotCRP improperly delivers uploaded documents inline in the browser, including HTML or SVG files, instead of forcing downloads, allowing malicious scripts to execute in the context of the user’s session. Exploitation requires a user to click a malicious document link, enabling attackers to steal credentials and perform arbitrary API calls. The vulnerability affects file upload or attachment fields except for PDF uploads. No known exploitation in the wild has been reported. The vulnerability has a CVSS 3. 1 score of 7.
AI Analysis
Technical Summary
CVE-2026-25156 is a cross-site scripting vulnerability categorized under CWE-79, affecting HotCRP version 3.2, a widely used conference review management software. The vulnerability was introduced in October 2025 due to improper handling of Content-Disposition headers when delivering uploaded documents. HotCRP versions from October 2025 through January 2026 allowed all document types to be rendered inline in users’ browsers rather than forcing downloads, contrary to the intended behavior which restricted inline rendering to specific MIME types like text/plain, PDF, and common image formats. This flaw enables an attacker to upload malicious HTML or SVG files via submission fields that accept file uploads or attachments (excluding PDF upload fields). When a user clicks on such a malicious document link, the embedded JavaScript executes in the context of the HotCRP web application, granting access to the user’s session credentials. This can lead to unauthorized API calls, data exfiltration, or manipulation of conference review data. The vulnerability requires the attacker to have the ability to upload files and the victim to interact by clicking the malicious link, with some level of user privileges (PR:L). The issue was fixed in HotCRP version 3.2.1 by restricting inline delivery and removing support for the save=0 URL parameter that forced inline rendering. No evidence of exploitation in the wild has been found after scanning hotcrp.com. The CVSS 3.1 score of 7.3 reflects a high severity due to the potential for credential theft and API misuse, with network attack vector, low complexity, and user interaction required.
Potential Impact
For European organizations, especially academic institutions, research centers, and conference organizers using HotCRP 3.2, this vulnerability poses significant risks. Successful exploitation can lead to theft of user credentials, unauthorized access to sensitive review data, manipulation of conference submissions, and potential disruption of the peer review process. Confidentiality and integrity of sensitive academic data are at risk, which could undermine trust in conference management and affect reputations. The vulnerability requires user interaction and some privileges, limiting mass exploitation but still posing a targeted threat. Given the collaborative nature of academic conferences in Europe, attackers could leverage this flaw to gain footholds in networks or conduct espionage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities post-disclosure. Organizations failing to patch or restrict upload capabilities remain vulnerable to targeted phishing or social engineering attacks involving malicious document links.
Mitigation Recommendations
European organizations should immediately upgrade HotCRP installations from version 3.2 to 3.2.1 or later, which contains the fix for this vulnerability. Until patching is possible, restrict file upload permissions to trusted users only and disable or tightly control the types of files allowed for upload, explicitly blocking HTML, SVG, and other executable content types. Implement Content Security Policy (CSP) headers to limit script execution and reduce the impact of potential XSS attacks. Educate users to avoid clicking on suspicious document links within the HotCRP environment. Monitor logs for unusual API calls or user behavior that could indicate exploitation attempts. Regularly audit uploaded documents for suspicious content and consider integrating malware scanning for uploaded files. Finally, review and remove support for the save=0 URL parameter if still in use, as it facilitates inline rendering of arbitrary documents.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland
CVE-2026-25156: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kohler hotcrp
Description
CVE-2026-25156 is a high-severity cross-site scripting (XSS) vulnerability in HotCRP conference review software version 3. 2, introduced in October 2025 and fixed in version 3. 2. 1. The flaw arises because HotCRP improperly delivers uploaded documents inline in the browser, including HTML or SVG files, instead of forcing downloads, allowing malicious scripts to execute in the context of the user’s session. Exploitation requires a user to click a malicious document link, enabling attackers to steal credentials and perform arbitrary API calls. The vulnerability affects file upload or attachment fields except for PDF uploads. No known exploitation in the wild has been reported. The vulnerability has a CVSS 3. 1 score of 7.
AI-Powered Analysis
Technical Analysis
CVE-2026-25156 is a cross-site scripting vulnerability categorized under CWE-79, affecting HotCRP version 3.2, a widely used conference review management software. The vulnerability was introduced in October 2025 due to improper handling of Content-Disposition headers when delivering uploaded documents. HotCRP versions from October 2025 through January 2026 allowed all document types to be rendered inline in users’ browsers rather than forcing downloads, contrary to the intended behavior which restricted inline rendering to specific MIME types like text/plain, PDF, and common image formats. This flaw enables an attacker to upload malicious HTML or SVG files via submission fields that accept file uploads or attachments (excluding PDF upload fields). When a user clicks on such a malicious document link, the embedded JavaScript executes in the context of the HotCRP web application, granting access to the user’s session credentials. This can lead to unauthorized API calls, data exfiltration, or manipulation of conference review data. The vulnerability requires the attacker to have the ability to upload files and the victim to interact by clicking the malicious link, with some level of user privileges (PR:L). The issue was fixed in HotCRP version 3.2.1 by restricting inline delivery and removing support for the save=0 URL parameter that forced inline rendering. No evidence of exploitation in the wild has been found after scanning hotcrp.com. The CVSS 3.1 score of 7.3 reflects a high severity due to the potential for credential theft and API misuse, with network attack vector, low complexity, and user interaction required.
Potential Impact
For European organizations, especially academic institutions, research centers, and conference organizers using HotCRP 3.2, this vulnerability poses significant risks. Successful exploitation can lead to theft of user credentials, unauthorized access to sensitive review data, manipulation of conference submissions, and potential disruption of the peer review process. Confidentiality and integrity of sensitive academic data are at risk, which could undermine trust in conference management and affect reputations. The vulnerability requires user interaction and some privileges, limiting mass exploitation but still posing a targeted threat. Given the collaborative nature of academic conferences in Europe, attackers could leverage this flaw to gain footholds in networks or conduct espionage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities post-disclosure. Organizations failing to patch or restrict upload capabilities remain vulnerable to targeted phishing or social engineering attacks involving malicious document links.
Mitigation Recommendations
European organizations should immediately upgrade HotCRP installations from version 3.2 to 3.2.1 or later, which contains the fix for this vulnerability. Until patching is possible, restrict file upload permissions to trusted users only and disable or tightly control the types of files allowed for upload, explicitly blocking HTML, SVG, and other executable content types. Implement Content Security Policy (CSP) headers to limit script execution and reduce the impact of potential XSS attacks. Educate users to avoid clicking on suspicious document links within the HotCRP environment. Monitor logs for unusual API calls or user behavior that could indicate exploitation attempts. Regularly audit uploaded documents for suspicious content and consider integrating malware scanning for uploaded files. Finally, review and remove support for the save=0 URL parameter if still in use, as it facilitates inline rendering of arbitrary documents.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-29T15:39:11.822Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697d3064ac06320222828d99
Added to database: 1/30/2026, 10:27:48 PM
Last enriched: 1/30/2026, 10:42:09 PM
Last updated: 1/31/2026, 7:25:50 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1251: CWE-639 Authorization Bypass Through User-Controlled Key in psmplugins SupportCandy – Helpdesk & Customer Support Ticket System
MediumCVE-2026-0683: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in psmplugins SupportCandy – Helpdesk & Customer Support Ticket System
MediumCVE-2026-1431: CWE-862 Missing Authorization in wpdevelop Booking Calendar
MediumCVE-2025-15525: CWE-863 Incorrect Authorization in dcooney Ajax Load More – Infinite Scroll, Load More, & Lazy Load
MediumCVE-2025-15510: CWE-862 Missing Authorization in webaways NEX-Forms – Ultimate Forms Plugin for WordPress
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.