Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mcgill
Mcgill loris |
|
| CPEs | cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:* cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Mcgill
Mcgill loris |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aces
Aces loris |
|
| Vendors & Products |
Aces
Aces loris |
|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, a SQL injection has been identified in some code sections for the MRI feedback popup window of the imaging browser. Attackers can use SQL ingestion to access/alter data on the server. This vulnerability is fixed in 27.0.3 and 28.0.1. | |
| Title | LORIS has a SQL injection in MRI feedback popup | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T19:24:05.846Z
Reserved: 2026-03-18T22:15:11.814Z
Link: CVE-2026-33350
Updated: 2026-04-08T19:24:00.763Z
Status : Analyzed
Published: 2026-04-08T19:25:21.163
Modified: 2026-04-17T15:50:43.860
Link: CVE-2026-33350
No data.
OpenCVE Enrichment
Updated: 2026-04-08T20:12:45Z