LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, an endpoint in the publication module was incorrectly trusting the baseURL submitted by a user's POST request rather than the internal LORIS value. This could result in a theoretical attacker with publication module access forging an email to an external domain under the attacker's control which appeared to come from LORIS. This vulnerability is fixed in 27.0.3 and 28.0.1.
References
| Link | Resource |
|---|---|
| https://github.com/aces/Loris/security/advisories/GHSA-6prw-34x8-3gpg | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Apr 2026, 20:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:* cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:* |
|
| References | () https://github.com/aces/Loris/security/advisories/GHSA-6prw-34x8-3gpg - Vendor Advisory | |
| First Time |
Mcgill
Mcgill loris |
08 Apr 2026, 19:25
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 19:25
Updated : 2026-04-21 20:13
NVD link : CVE-2026-35400
Mitre link : CVE-2026-35400
CVE.ORG link : CVE-2026-35400
JSON object : View
Products Affected
mcgill
- loris
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
