Untriaged
Permalink
CVE-2026-35165
6.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
LORIS has incorrect access checks in document_repository
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 21.0.0 to before 27.0.3 and 28.0.1, while the document_repository frontend was restricting file access, the backend endpoint was not correctly verifying access permissions. A user could theoretically download a file that they should not have access to, if they know or can brute force the filename. This vulnerability is fixed in 27.0.3 and 28.0.1.
References
-
https://github.com/aces/Loris/security/advisories/GHSA-qp6x-qfx7-54wp x_refsource_CONFIRM
Affected products
Loris
- ==>= 28.0.0, < 28.0.1
- ==>= 21.0.0, < 27.0.3
Package maintainers
-
@lutzberger Lutz Berger <lutz.berger@airbus.com>