CVE-2026-25156
Cross-Site Scripting in HotCRP Document Rendering Component
Publication date: 2026-01-30
Last updated on: 2026-02-19
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hotcrp | hotcrp | 3.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in HotCRP conference review software caused documents of all types to be delivered inline in the user's browser instead of being downloaded, when only certain types were intended to be inline. This allowed an attacker to upload malicious HTML or SVG documents that would execute JavaScript in the user's browser with access to their HotCRP credentials, enabling cross-site scripting (XSS) attacks and arbitrary API calls. The issue affected versions from October 2025 through January 2026 and was fixed in version 3.2.1.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow attackers to execute malicious scripts in the context of the user's browser, stealing HotCRP credentials and making unauthorized API calls. This could lead to unauthorized access to sensitive conference review data and manipulation of the system through the compromised user account.
What immediate steps should I take to mitigate this vulnerability?
Upgrade HotCRP to version 3.2.1 or later, which includes the fix for this vulnerability. Additionally, avoid uploading HTML or SVG documents to submission fields or as attachments to comments until the update is applied. Note that PDF upload fields are not vulnerable.