| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rm2q-f7jv-3cfp | Indico discloses local files resulting in Remote Code Execution through LaTeX injection |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Indico
Indico indico |
|
| Vendors & Products |
Indico
Indico indico |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. In versions prior to 3.3.12, due to vulnerabilities in TeXLive and obscure LaTeX syntax that allowed circumventing Indico's LaTeX sanitizer, it is possible to use specially-crafted LaTeX snippets which can read local files or execute code with the privileges of the user running Indico on the server. Note that if server-side LaTeX rendering is not in use (ie `XELATEX_PATH` was not set in `indico.conf`), this vulnerability does not apply. It is recommended to update to Indico 3.3.12 as soon as possible. It is also strongly recommended to enable the containerized LaTeX renderer (using `podman`), which isolates it from the rest of the system. As a workaround, remove the `XELATEX_PATH` setting from `indico.conf` (or comment it out or set it to `None`) and restart the `indico-uwsgi` and `indico-celery` services to disable LaTeX functionality. | |
| Title | Indico discloses local files resulting in Remote Code Execution through LaTeX injection | |
| Weaknesses | CWE-22 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T13:42:19.688Z
Reserved: 2026-03-17T18:10:50.211Z
Link: CVE-2026-33046
Updated: 2026-03-24T13:42:16.058Z
Status : Awaiting Analysis
Published: 2026-03-23T23:17:12.520
Modified: 2026-03-24T15:53:48.067
Link: CVE-2026-33046
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:30:04Z
Github GHSA