Featured image of post CVE-2025-53640

CVE-2025-53640

Broken Access Control

CVE-2025-53640: User enumeration via API endpoint

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-53640

Summary

a Broken Object Level Authorization (BOLA) vulnerability in Indico enables authenticated user enumeration via the /api/principals endpoint, exposing names, emails, and affiliations. Includes exploitation script, request analysis, and screenshots. Affects globally deployed Indico instances (European Organization for Nuclear Research (CERN), United Nations (UN), Massachusetts Institute of Technology (MIT), European Space Agency (ESA), among others).

Details

A Broken Object Level Authorization (BOLA) vulnerability in the open-source application Indico allows mass user enumeration through the /api/principals endpoint.

Originally intended to resolve user IDs in specific form fields, this endpoint can be misused to retrieve personal details of any valid user ID:

  • Full name
  • Email address
  • Title
  • Affiliation
  • Avatar URL

Exploitation Requirements

  • A valid authenticated session is required.
  • However, most public Indico instances allow self-registration with no email verification, CAPTCHA, or manual approval.
  • This makes the vulnerability practically exploitable by unauthenticated users after trivial account creation.

PoC

Exploit

1
PoC script to be published after responsible disclosure timeline.

Global Impact

Indico is a widely adopted event and conference management platform developed by CERN (European Organization for Nuclear Research), powering academic and institutional infrastructure globally:

  • CERN (European Organization for Nuclear Research): Over 900,000 events annually; 200+ rooms booked daily.
  • Worldwide: Around 145,000 events/year across 300+ institutions.
  • UN (United Nations): Over 180,000 participants/year.
  • UNOG (United Nations Office at Geneva): Up to 700,000 users/year.
  • Extensively used by universities, laboratories, research institutes, and government agencies.

Examples of affected public instances:

Due to its widespread adoption in scientific, academic, and governmental environments, this vulnerability poses serious risks:

Impact

References

https://github.com/CVE-Hunters/CVE/blob/main/Indico/CVE-2025-53640.md

https://github.com/indico/indico/security/advisories/GHSA-q28v-664f-q6wj

Finder

Rafael Corvino

Contributor

Natan Maia Morette

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy