VYPR
High severity8.7NVD Advisory· Published Apr 8, 2026· Updated Apr 21, 2026

CVE-2026-35169

CVE-2026-35169

Description

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sanitize some user supplied variables which could result in a reflected cross-site scripting attack if a user is tricked into following an invalid link. The same input vector could also allow an attacker to download arbitrary markdown files on an unpatched server. This vulnerability is fixed in 27.0.3 and 28.0.1.

Affected products

2
  • Mcgill/Loris2 versions
    cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*range: >=15.10,<=27.0.2
    • cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.