Description
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 24.0.0 to before 27.0.3 and 28.0.1, an incorrect order of operations in the FilesDownloadHandler could result in an attacker escaping the intended download directories. This vulnerability is fixed in 27.0.3 and 28.0.1.
Published: 2026-04-08
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: File Disclosure
Action: Immediate Patch
AI Analysis

Impact

LORIS’s FilesDownloadHandler processes download requests with an incorrect order of operations, allowing attackers to escape the intended download directories via crafted URLs. The result is the ability to download arbitrary files stored on the web server, potentially exposing sensitive project data, configuration files, or user credentials to any attacker who can access the application. This flaw falls under CWE‑552 and carries a CVSS score of 7.7, indicating high severity and a significant threat to confidentiality.

Affected Systems

The vulnerability affects LORIS 24.0.0, all releases up to before 27.0.3, and 28.0.1. These are self‑hosted instances used for neuroimaging research that provide data and project management. All affected installations may allow unauthorized file download unless upgraded to the patched versions.

Risk and Exploitability

With a CVSS score of 7.7 the risk is high, and because the flaw is exploitable by sending a specially crafted request from any network segment that can reach the application, the attack vector is inferred to be remote over HTTP. No EPSS information is available, but the lack of authentication requirements and the straightforward request pattern suggest a high likelihood of exploitation in exposed environments. The vulnerability is not listed in the CISA KEV catalog, but its potential impact justifies immediate attention.

Generated by OpenCVE AI on April 8, 2026 at 20:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Loris to version 27.0.3 or later, which contains the patch for the FilesDownloadHandler.
  • If an upgrade is not immediately possible, restrict file download functionality by configuring the web server to serve only the intended download directories and deny traversal patterns; alternatively, disable the download endpoint until a patch can be applied.
  • Add application‑level validation to reject requests containing directory traversal characters such as ".." or absolute paths.
  • Deploy a web application firewall rule to block path traversal patterns and reduce the attack surface.

Generated by OpenCVE AI on April 8, 2026 at 20:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Mcgill
Mcgill loris
CPEs cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:*
cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:*
Vendors & Products Mcgill
Mcgill loris

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Aces
Aces loris
Vendors & Products Aces
Aces loris

Wed, 08 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 24.0.0 to before 27.0.3 and 28.0.1, an incorrect order of operations in the FilesDownloadHandler could result in an attacker escaping the intended download directories. This vulnerability is fixed in 27.0.3 and 28.0.1.
Title LORIS has a path traversal in FilesDownloadHandler
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T20:13:54.835Z

Reserved: 2026-04-02T19:25:52.192Z

Link: CVE-2026-35446

cve-icon Vulnrichment

Updated: 2026-04-08T20:13:49.952Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T19:25:24.217

Modified: 2026-04-21T20:04:43.860

Link: CVE-2026-35446

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:46Z

Weaknesses