Vulnerability Description
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sanitize some user supplied variables which could result in a reflected cross-site scripting attack if a user is tricked into following an invalid link. The same input vector could also allow an attacker to download arbitrary markdown files on an unpatched server. This vulnerability is fixed in 27.0.3 and 28.0.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mcgill | Loris | >= 15.10, <= 27.0.2 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-35169?
CVE-2026-35169 is a vulnerability with a CVSS score of 8.7 (HIGH). LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the he...
How severe is CVE-2026-35169?
CVE-2026-35169 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35169?
Check the references section above for vendor advisories and patch information. Affected products include: Mcgill Loris.