Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25156: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kohler hotcrp

0
High
VulnerabilityCVE-2026-25156cvecve-2026-25156cwe-79
Published: Fri Jan 30 2026 (01/30/2026, 22:11:35 UTC)
Source: CVE Database V5
Vendor/Project: kohler
Product: hotcrp

Description

CVE-2026-25156 is a high-severity cross-site scripting (XSS) vulnerability in HotCRP conference review software version 3. 2, introduced in October 2025 and fixed in version 3. 2. 1. The flaw arises because HotCRP improperly delivers uploaded documents inline in the browser, including HTML or SVG files, instead of forcing downloads, allowing malicious scripts to execute in the context of the user’s session. Exploitation requires a user to click a malicious document link, enabling attackers to steal credentials and perform arbitrary API calls. The vulnerability affects file upload or attachment fields except for PDF uploads. No known exploitation in the wild has been reported. The vulnerability has a CVSS 3. 1 score of 7.

AI-Powered Analysis

AILast updated: 01/30/2026, 22:42:09 UTC

Technical Analysis

CVE-2026-25156 is a cross-site scripting vulnerability categorized under CWE-79, affecting HotCRP version 3.2, a widely used conference review management software. The vulnerability was introduced in October 2025 due to improper handling of Content-Disposition headers when delivering uploaded documents. HotCRP versions from October 2025 through January 2026 allowed all document types to be rendered inline in users’ browsers rather than forcing downloads, contrary to the intended behavior which restricted inline rendering to specific MIME types like text/plain, PDF, and common image formats. This flaw enables an attacker to upload malicious HTML or SVG files via submission fields that accept file uploads or attachments (excluding PDF upload fields). When a user clicks on such a malicious document link, the embedded JavaScript executes in the context of the HotCRP web application, granting access to the user’s session credentials. This can lead to unauthorized API calls, data exfiltration, or manipulation of conference review data. The vulnerability requires the attacker to have the ability to upload files and the victim to interact by clicking the malicious link, with some level of user privileges (PR:L). The issue was fixed in HotCRP version 3.2.1 by restricting inline delivery and removing support for the save=0 URL parameter that forced inline rendering. No evidence of exploitation in the wild has been found after scanning hotcrp.com. The CVSS 3.1 score of 7.3 reflects a high severity due to the potential for credential theft and API misuse, with network attack vector, low complexity, and user interaction required.

Potential Impact

For European organizations, especially academic institutions, research centers, and conference organizers using HotCRP 3.2, this vulnerability poses significant risks. Successful exploitation can lead to theft of user credentials, unauthorized access to sensitive review data, manipulation of conference submissions, and potential disruption of the peer review process. Confidentiality and integrity of sensitive academic data are at risk, which could undermine trust in conference management and affect reputations. The vulnerability requires user interaction and some privileges, limiting mass exploitation but still posing a targeted threat. Given the collaborative nature of academic conferences in Europe, attackers could leverage this flaw to gain footholds in networks or conduct espionage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities post-disclosure. Organizations failing to patch or restrict upload capabilities remain vulnerable to targeted phishing or social engineering attacks involving malicious document links.

Mitigation Recommendations

European organizations should immediately upgrade HotCRP installations from version 3.2 to 3.2.1 or later, which contains the fix for this vulnerability. Until patching is possible, restrict file upload permissions to trusted users only and disable or tightly control the types of files allowed for upload, explicitly blocking HTML, SVG, and other executable content types. Implement Content Security Policy (CSP) headers to limit script execution and reduce the impact of potential XSS attacks. Educate users to avoid clicking on suspicious document links within the HotCRP environment. Monitor logs for unusual API calls or user behavior that could indicate exploitation attempts. Regularly audit uploaded documents for suspicious content and consider integrating malware scanning for uploaded files. Finally, review and remove support for the save=0 URL parameter if still in use, as it facilitates inline rendering of arbitrary documents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697d3064ac06320222828d99

Added to database: 1/30/2026, 10:27:48 PM

Last enriched: 1/30/2026, 10:42:09 PM

Last updated: 1/31/2026, 7:25:50 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats