CVE-2026-35400

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, an endpoint in the publication module was incorrectly trusting the baseURL submitted by a user's POST request rather than the internal LORIS value. This could result in a theoretical attacker with publication module access forging an email to an external domain under the attacker's control which appeared to come from LORIS. This vulnerability is fixed in 27.0.3 and 28.0.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*
cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:*

History

21 Apr 2026, 20:13

Type Values Removed Values Added
CPE cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*
cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:*
References () https://github.com/aces/Loris/security/advisories/GHSA-6prw-34x8-3gpg - () https://github.com/aces/Loris/security/advisories/GHSA-6prw-34x8-3gpg - Vendor Advisory
First Time Mcgill
Mcgill loris

08 Apr 2026, 19:25

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 19:25

Updated : 2026-04-21 20:13


NVD link : CVE-2026-35400

Mitre link : CVE-2026-35400

CVE.ORG link : CVE-2026-35400


JSON object : View

Products Affected

mcgill

  • loris
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')