LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sanitize some user supplied variables which could result in a reflected cross-site scripting attack if a user is tricked into following an invalid link. The same input vector could also allow an attacker to download arbitrary markdown files on an unpatched server. This vulnerability is fixed in 27.0.3 and 28.0.1.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mcgill
Mcgill loris |
|
| CPEs | cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:* cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Mcgill
Mcgill loris |
Thu, 09 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aces
Aces loris |
|
| Vendors & Products |
Aces
Aces loris |
Wed, 08 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sanitize some user supplied variables which could result in a reflected cross-site scripting attack if a user is tricked into following an invalid link. The same input vector could also allow an attacker to download arbitrary markdown files on an unpatched server. This vulnerability is fixed in 27.0.3 and 28.0.1. | |
| Title | LORIS has potential cross-site scripting in help_editor module | |
| Weaknesses | CWE-552 CWE-79 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-08T18:24:27.757Z
Updated: 2026-04-09T14:21:17.788Z
Reserved: 2026-04-01T17:26:21.133Z
Link: CVE-2026-35169
Updated: 2026-04-09T14:21:14.175Z
Status : Analyzed
Published: 2026-04-08T19:25:23.447
Modified: 2026-04-21T20:16:53.940
Link: CVE-2026-35169
No data.
ReportizFlow