Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mcgill
Mcgill loris |
|
| CPEs | cpe:2.3:a:mcgill:loris:*:*:*:*:*:*:*:* cpe:2.3:a:mcgill:loris:28.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Mcgill
Mcgill loris |
Fri, 10 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aces
Aces loris |
|
| Vendors & Products |
Aces
Aces loris |
Wed, 08 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 15.10 to before 27.0.3 and 28.0.1, there is a potential for a cross-site scripting attack in the survey_accounts module if a user provides an invalid visit label. While the data is properly JSON encoded, the Content-Type header is not set causing the web browser to interpret the payload as HTML, opening the possibility of a cross-site scripting if a user is tricked into following an invalid link. This vulnerability is fixed in 27.0.3 and 28.0.1. | |
| Title | LORIS has potential cross-site scripting in survey_accounts module | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-10T20:42:38.101Z
Reserved: 2026-04-02T17:03:42.074Z
Link: CVE-2026-35403
Updated: 2026-04-10T20:42:33.010Z
Status : Analyzed
Published: 2026-04-08T19:25:23.893
Modified: 2026-04-21T20:06:28.810
Link: CVE-2026-35403
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:27:47Z