{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T21:55:53.564","vulnerabilities":[{"cve":{"id":"CVE-2026-28352","sourceIdentifier":"security-advisories@github.com","published":"2026-02-27T21:16:19.323","lastModified":"2026-03-03T18:31:21.570","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. In versions prior to 3.3.11, the API endpoint used to manage event series is missing an access check, allowing unauthenticated/unauthorized access to this endpoint. The impact of this is limited to getting the metadata (title, category chain, start/end date) for events in an existing series, deleting an existing event series, and modifying an existing event series. This vulnerability does NOT allow unauthorized access to events (beyond the basic metadata mentioned above), nor any kind of tampering with user-visible data in events. Version 3.3.11 fixes the issue. As a workaround, use the webserver to restrict access to the series management API endpoint."},{"lang":"es","value":"Indico es un sistema de gestión de eventos que utiliza Flask-Multipass, un sistema de autenticación multi-backend para Flask. En versiones anteriores a la 3.3.11, el endpoint de la API utilizado para gestionar series de eventos carece de una verificación de acceso, permitiendo acceso no autenticado/no autorizado a este endpoint. El impacto de esto se limita a obtener los metadatos (título, cadena de categoría, fecha de inicio/fin) para eventos en una serie existente, eliminar una serie de eventos existente y modificar una serie de eventos existente. Esta vulnerabilidad NO permite acceso no autorizado a eventos (más allá de los metadatos básicos mencionados anteriormente), ni ningún tipo de manipulación de datos visibles para el usuario en los eventos. La versión 3.3.11 corrige el problema. Como solución alternativa, utilice el servidor web para restringir el acceso al endpoint de la API de gestión de series."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cern:indico:*:*:*:*:*:*:*:*","versionEndExcluding":"3.3.11","matchCriteriaId":"85C78415-FE1D-48C2-9C1C-1B12AADFAFAC"}]}]}],"references":[{"url":"https://github.com/indico/indico/releases/tag/v3.3.11","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/indico/indico/security/advisories/GHSA-rfpp-2hgm-gp5v","source":"security-advisories@github.com","tags":["Mitigation","Patch","Vendor Advisory"]}]}}]}