LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 16.1.0 to before 27.0.3 and 28.0.1, While the frontend of the media module filters files that the user should not have access to, the backend was not applying access checks and it would be possible for someone who should not have access to a file to access it if they know the filename. This vulnerability is fixed in 27.0.3 and 28.0.1.
References
| Link | Resource |
|---|---|
| https://github.com/aces/Loris/security/advisories/GHSA-p42c-4gmq-hrjw | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Apr 2026, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:* cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:* |
|
| References | () https://github.com/aces/Loris/security/advisories/GHSA-p42c-4gmq-hrjw - Vendor Advisory | |
| First Time |
Mcgill
Mcgill loris |
08 Apr 2026, 19:25
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 19:25
Updated : 2026-04-21 20:20
NVD link : CVE-2026-34985
Mitre link : CVE-2026-34985
CVE.ORG link : CVE-2026-34985
JSON object : View
Products Affected
mcgill
- loris
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
