CVE-2026-23836

9.9 CRITICAL

📋 TL;DR

CVE-2026-23836 is a critical remote code execution vulnerability in HotCRP conference review software. It allows authenticated users to execute arbitrary PHP code through inadequately sanitized formula generation. All HotCRP instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • HotCRP
Versions: Version 3.1 (specifically versions after April 2024 changes)
Operating Systems: All operating systems running HotCRP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit. The vulnerability was introduced in April 2024 changes to version 3.1.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, access sensitive data, install malware, or pivot to other systems.

🟠

Likely Case

Unauthorized data access, manipulation of conference reviews, privilege escalation, and potential lateral movement within the hosting environment.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place, though code execution would still be possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access. The vulnerability is in formula generation code that inadequately sanitizes user input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.2

Vendor Advisory: https://github.com/kohler/hotcrp/security/advisories/GHSA-hpqh-j6qx-x57h

Restart Required: Yes

Instructions:

1. Backup your HotCRP installation and database. 2. Download HotCRP version 3.2 from the official repository. 3. Replace the existing installation with version 3.2 files. 4. Restart your web server (Apache/Nginx). 5. Verify the installation is working correctly.

🔧 Temporary Workarounds

Disable formula functionality

all

Temporarily disable HotCRP formula generation features to prevent exploitation

# Modify HotCRP configuration to disable formula features
# Check HotCRP documentation for specific configuration options

Restrict user permissions

all

Limit user access to formula-related functionality

# Review and modify user role permissions in HotCRP
# Remove formula creation/editing permissions from non-admin users

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate HotCRP instances
  • Enable detailed logging and monitoring for suspicious formula-related activities

🔍 How to Verify

Check if Vulnerable:

Check if your HotCRP version is 3.1 with changes from April 2024 or later. Review the commit history for the problematic code changes.

Check Version:

Check the HotCRP version in the software interface or review the source code version information.

Verify Fix Applied:

Verify that HotCRP version is 3.2 or later. Check that the commits 4674fcfbb76511072a1145dad620756fc1d4b4e9 and bfc7e0db15df6ed6d544a639020d2ce05a5f0834 are applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual formula generation requests
  • PHP execution errors in web server logs
  • Suspicious user activity with formula features

Network Indicators:

  • Unexpected outbound connections from HotCRP server
  • Unusual patterns in HTTP requests to formula endpoints

SIEM Query:

source="web_server_logs" AND (uri="*formula*" OR uri="*eval*" OR uri="*exec*") AND status>=200

🔗 References

📤 Share & Export