VYPR
Low severity3.5NVD Advisory· Published Apr 8, 2026· Updated Apr 21, 2026

CVE-2026-35400

CVE-2026-35400

Description

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, an endpoint in the publication module was incorrectly trusting the baseURL submitted by a user's POST request rather than the internal LORIS value. This could result in a theoretical attacker with publication module access forging an email to an external domain under the attacker's control which appeared to come from LORIS. This vulnerability is fixed in 27.0.3 and 28.0.1.

Affected products

2
  • Mcgill/Loris2 versions
    cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*range: >=20.0.0,<=27.0.2
    • cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.