VYPR
Medium severity4.3NVD Advisory· Published Apr 9, 2026· Updated Apr 22, 2026

CVE-2026-39985

CVE-2026-39985

Description

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, the redirect parameter upon login to LORIS was not validating the value of the redirect as being within LORIS, which could be used to trick users into visiting arbitrary URLs if they are given a link with a third party redirect parameter. This vulnerability is fixed in 27.0.3 and 28.0.1.

Affected products

2
  • Mcgill/Loris2 versions
    cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*range: <27.0.3
    • cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:*

Patches

1

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.