Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
WS-2019-0356
Published:May 14, 2026
Updated:May 14, 2026
Local file disclosure through LaTeX injection Impact An external audit of the Indico codebase has discovered a vulnerability in Indico's LaTeX sanitization code, which could have malicious users to run unsafe LaTeX commands on the server. Such commands allowed for example to read local files (e.g. "indico.conf"). As far as we know it is not possible to write files or execute code using this vulnerability. Patches You need to update to "Indico 2.2.3" (https://github.com/indico/indico/releases/tag/v2.2.3) as soon as possible. We also released "Indico 2.1.10" (https://github.com/indico/indico/releases/tag/v2.1.10) in case you cannot update to 2.2 for some reason. See https://docs.getindico.io/en/stable/installation/upgrade/ for instructions on how to update. Workarounds Setting "XELATEX_PATH = None" in "indico.conf" will result in an error when building a PDF, but without being able to run xelatex, the vulnerability cannot be abused. For more information If you have any questions or comments about this advisory: * Open a thread in "our forum" (https://talk.getindico.io/) * Email us privately at "indico-team@cern.ch" (mailto:indico-team@cern.ch)
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.2
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.1
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of Special Elements used in a Command ('Command Injection')