Untriaged
Permalink
CVE-2026-33350
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
LORIS has a SQL injection in MRI feedback popup
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, a SQL injection has been identified in some code sections for the MRI feedback popup window of the imaging browser. Attackers can use SQL ingestion to access/alter data on the server. This vulnerability is fixed in 27.0.3 and 28.0.1.
References
-
https://github.com/aces/Loris/security/advisories/GHSA-9r29-6jgc-3ggh x_refsource_CONFIRM
Affected products
Loris
- ==>= 28.0.0, < 28.0.1
- ==< 27.0.3
Package maintainers
-
@lutzberger Lutz Berger <lutz.berger@airbus.com>