๐Ÿ” CVE Alert

CVE-2026-25738

UNKNOWN 0.0

Indico has Server-Side Request Forgery (SSRF) in multiple places

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. Versions prior to 3.3.10 are vulnerable to server-side request forgery. Indico makes outgoing requests to user-provides URLs in various places. This is mostly intentional and part of Indico's functionality but is never intended to let users access "special" targets such as localhost or cloud metadata endpoints. Users should upgrade to version 3.3.10 to receive a patch. Those who do not have IPs that expose sensitive data without authentication (typically because they do not host Indico on AWS) are not affected. Only event organizers can access endpoints where SSRF could be used to actually see the data returned by such a request. For those who trust their event organizers, the risk is also very limited. For additional security, both before and after patching, one may also use the common proxy-related environment variables (in particular `http_proxy` and `https_proxy`) to force outgoing requests to go through a proxy that limits requests in whatever way you deem useful/necessary. These environment variables would need to be set both on the indico-uwsgi and indico-celery services.

CWE CWE-367 CWE-918
Vendor indico
Product indico
Published Feb 19, 2026
Last Updated Feb 19, 2026
Stay Ahead of the Next One

Get instant alerts for indico indico

Be the first to know when new unknown vulnerabilities affecting indico indico are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

indico / indico
< 3.3.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/indico/indico/security/advisories/GHSA-f47c-3c5w-v7p4 github.com: https://github.com/indico/indico/commit/70d341826116fac5868719a6133f2c26d9345137 github.com: https://github.com/indico/indico/releases/tag/v3.3.10