Medium severity6.5NVD Advisory· Published Apr 8, 2026· Updated Apr 21, 2026
CVE-2026-35403
CVE-2026-35403
Description
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 15.10 to before 27.0.3 and 28.0.1, there is a potential for a cross-site scripting attack in the survey_accounts module if a user provides an invalid visit label. While the data is properly JSON encoded, the Content-Type header is not set causing the web browser to interpret the payload as HTML, opening the possibility of a cross-site scripting if a user is tricked into following an invalid link. This vulnerability is fixed in 27.0.3 and 28.0.1.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/aces/Loris/security/advisories/GHSA-776p-5pwh-vc8pnvdPatchVendor Advisory
News mentions
0No linked articles in our index yet.