Description
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sanitize some user supplied variables which could result in a reflected cross-site scripting attack if a user is tricked into following an invalid link. The same input vector could also allow an attacker to download arbitrary markdown files on an unpatched server. This vulnerability is fixed in 27.0.3 and 28.0.1.
Published: 2026-04-08
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting and Arbitrary File Download
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the help_editor module of Loris, a self‑hosted web application for neuroimaging research. Versions before 27.0.3 (in the 27 series) and before 28.0.1 (in the 28 series) fail to sanitize certain user‑supplied variables. This flaw allows a reflected cross‑site scripting (XSS) attack if a user follows a maliciously crafted link. The same input path also lets an attacker download arbitrary markdown files from an unpatched server.

Affected Systems

The issue affects installations of Loris running versions older than 27.0.3 or 28.0.1. The vendor "aces" has released patch versions that include the sanitization fix. No explicit deployment environment is documented, but the application is typically self‑hosted.

Risk and Exploitability

The CVSS score of 8.7 indicates a high‑severity flaw that is potentially exploitable via a web‑based request to the help_editor endpoint. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the victim to be a legitimate Loris user who clicks a crafted URL; the attacker can then execute arbitrary JavaScript in the victim’s browser and obtain markdown files, compromising confidentiality and enabling further exploitation of the hosting environment.

Generated by OpenCVE AI on April 8, 2026 at 21:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Loris to version 27.0.3 or later in the 27 series, or to 28.0.1 or later in the 28 series, to apply the sanitization fix.
  • If an upgrade cannot be performed immediately, restrict access to the help_editor module to trusted internal users and block the endpoint from public or untrusted networks.
  • Disable or remove the markdown download capability for unpatched instances until a patch is applied.
  • Monitor logs for suspicious access to the help_editor endpoint and block offending IP addresses.
  • Configure a web application firewall to detect and block reflected XSS payloads targeting the help_editor module.

Generated by OpenCVE AI on April 8, 2026 at 21:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Aces
Aces loris
Vendors & Products Aces
Aces loris

Wed, 08 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sanitize some user supplied variables which could result in a reflected cross-site scripting attack if a user is tricked into following an invalid link. The same input vector could also allow an attacker to download arbitrary markdown files on an unpatched server. This vulnerability is fixed in 27.0.3 and 28.0.1.
Title LORIS has potential cross-site scripting in help_editor module
Weaknesses CWE-552
CWE-79
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T14:21:17.788Z

Reserved: 2026-04-01T17:26:21.133Z

Link: CVE-2026-35169

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T19:25:23.447

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-35169

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:49Z

Weaknesses