Impact
HotCRP delivered all document types with inline Content‑Disposition in October 2025–January 2026, leading to stored cross‑site scripting when users opened uploaded HTML or SVG files. The injected script runs in the user’s browser with the user’s HotCRP session, allowing an attacker to read or alter data via the API. This flaw is a classical input‑validation weakness (CWE‑79) and can compromise confidentiality, integrity, and availability of the HotCRP instance.
Affected Systems
The vulnerability affects kohler's HotCRP version 3.2 from October 2025 through January 2026, inclusive of all development builds. It is fixed in HotCRP v3.2.1 and the corresponding patch commits. Only document uploads with file‑upload or attachment fields are impacted; PDF upload fields remained safe.
Risk and Exploitability
The CVSS score is 7.3, indicating high severity, but the EPSS score is below 1%, showing a currently low probability of exploitation. The flaw is not listed in the CISA KEV catalog. Attackers need only upload a malicious HTML or SVG attachment and have a user click the link; no authentication or local privilege is required beyond the victim’s session. If no public exploits exist, the risk remains theoretical until an attacker’s script executes due to a user’s interaction.
OpenCVE Enrichment