Untriaged
Permalink
CVE-2026-34392
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
LORIS has a path traversal in static router
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, a bug in the static file router can allow an attacker to traverse outside of the intended directory, allowing unintended files to be downloaded through the static, css, and js endpoints. This vulnerability is fixed in 27.0.3 and 28.0.1.
References
-
https://github.com/aces/Loris/security/advisories/GHSA-rfj5-58hv-wc5f x_refsource_CONFIRM
Affected products
Loris
- ==>= 20.0.0, < 27.0.3
- ==>= 28.0.0, < 28.0.1
Package maintainers
-
@lutzberger Lutz Berger <lutz.berger@airbus.com>