Home

Description

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, an endpoint in the publication module was incorrectly trusting the baseURL submitted by a user's POST request rather than the internal LORIS value. This could result in a theoretical attacker with publication module access forging an email to an external domain under the attacker's control which appeared to come from LORIS. This vulnerability is fixed in 27.0.3 and 28.0.1.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-08 | Updated 2026-04-08 | Assigner GitHub_M




LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

>= 20.0.0, < 27.0.3
affected

>= 28.0.0, < 28.0.1
affected

References

github.com/.../Loris/security/advisories/GHSA-6prw-34x8-3gpg

cve.org (CVE-2026-35400)

nvd.nist.gov (CVE-2026-35400)

Download JSON