CVE-2026-23878

6.5 MEDIUM

📋 TL;DR

This vulnerability in HotCRP conference review software allows authors with at least one submission to download any documents (PDFs, attachments) from any submission on the site, bypassing intended access controls. It affects HotCRP installations running versions between specific commits. The issue enables unauthorized access to potentially sensitive submission materials.

💻 Affected Systems

Products:
  • HotCRP
Versions: Versions between commit aa20ef288828b04550950cf67c831af8a525f508 and prior to commit ceacd5f1476458792c44c6a993670f02c984b4a0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where authors have at least one submission. The vulnerability is in the document API functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authors could download all submission documents, exposing confidential research, proprietary data, or personally identifiable information from all conference submissions.

🟠

Likely Case

Authors with malicious intent could access and download documents from other submissions they shouldn't have access to, potentially stealing intellectual property or sensitive information.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized downloads could be detected and limited, though some data exposure might still occur before detection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires author-level access with at least one submission. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit ceacd5f1476458792c44c6a993670f02c984b4a0 or later

Vendor Advisory: https://github.com/kohler/hotcrp/security/advisories/GHSA-vh3x-xwj4-jvqx

Restart Required: Yes

Instructions:

1. Backup your HotCRP installation and database. 2. Update to commit ceacd5f1476458792c44c6a993670f02c984b4a0 or later. 3. Restart the web server/service. 4. Verify the fix by testing document access controls.

🔧 Temporary Workarounds

Disable document API for authors

all

Temporarily restrict author access to the document API functionality

Modify HotCRP configuration to remove document API permissions from author roles

Implement additional access logging

all

Add comprehensive logging for all document download attempts

Configure HotCRP to log all document API requests with user and document identifiers

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to HotCRP instances
  • Deploy a WAF with rules to detect and block suspicious document download patterns

🔍 How to Verify

Check if Vulnerable:

Check if your HotCRP installation is between commit aa20ef288828b04550950cf67c831af8a525f508 and prior to commit ceacd5f1476458792c44c6a993670f02c984b4a0

Check Version:

Check git log or version file in HotCRP installation directory

Verify Fix Applied:

Test with an author account that has at least one submission to ensure they cannot download documents from other submissions

📡 Detection & Monitoring

Log Indicators:

  • Multiple document downloads by single author account
  • Author downloading documents from submissions they didn't create
  • Unusual document access patterns

Network Indicators:

  • High volume of document downloads from author accounts
  • Document API requests with varying submission IDs from same user

SIEM Query:

source="hotcrp" AND (event="document_download" OR api="document") | stats count by user_id, submission_id | where count > 1

🔗 References

📤 Share & Export