Impact
A flaw in the LaTeX sanitizer of Indico allows specially crafted LaTeX snippets to bypass security checks and access local files or execute code with the privileges of the process running the server. This can lead to full system compromise if the server’s LaTeX renderer is enabled. If the server is not configured to run server‑side LaTeX (XELATEX_PATH unset), this vulnerability does not apply.
Affected Systems
Indico, the event management platform used by CERN. Versions earlier than 3.3.12 are affected. The vulnerability is tied to the TeXLive integration and the LaTeX sanitizer in these releases.
Risk and Exploitability
The CVSS score of 7.7 reflects a high severity RCE. The EPSS score of less than 1% indicates a low probability of widespread exploitation, and the vulnerability is not listed on the CISA KEV list. Attack likely involves providing a malicious LaTeX payload through the web interface, which the rendering engine processes and executes on the server, allowing an attacker to read files or run arbitrary commands with process privileges.
OpenCVE Enrichment
Github GHSA