VYPR
Medium severity6.5NVD Advisory· Published Apr 8, 2026· Updated Apr 21, 2026

CVE-2026-35403

CVE-2026-35403

Description

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 15.10 to before 27.0.3 and 28.0.1, there is a potential for a cross-site scripting attack in the survey_accounts module if a user provides an invalid visit label. While the data is properly JSON encoded, the Content-Type header is not set causing the web browser to interpret the payload as HTML, opening the possibility of a cross-site scripting if a user is tricked into following an invalid link. This vulnerability is fixed in 27.0.3 and 28.0.1.

Affected products

2
  • Mcgill/Loris2 versions
    cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*range: >=15.10,<=27.0.2
    • cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.