Path Traversal Vulnerability in LORIS Web Application by ACES
CVE-2026-26985
What is CVE-2026-26985?
LORIS (Longitudinal Online Research and Imaging System), a self-hosted web application for neuroimaging research management, contains a path traversal vulnerability that allows an authenticated user with the necessary permissions to read sensitive configuration files on the server. This vulnerability is particularly concerning as some of these files store hard-coded credentials, which can be exploited if reused for database or other service authentication. While the attacker must be authenticated, the ease of exploitation and the public availability of the application’s source code amplifies the risk. This issue has been addressed in LORIS versions 26.0.5, 27.0.2, and 28.0.0, with an administrative workaround available to disable the electrophysiology_browser module.
Affected Version(s)
Loris >= 24.0.0, < 26.0.5 < 24.0.0, 26.0.5
Loris >= 27.0.0, < 27.0.2 < 27.0.0, 27.0.2
