CVE-2026-35400
Received Received - Intake
Open Redirect in LORIS Publication Module Enables Email Spoofing

Publication date: 2026-04-08

Last updated on: 2026-04-21

Assigner: GitHub, Inc.

Description
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, an endpoint in the publication module was incorrectly trusting the baseURL submitted by a user's POST request rather than the internal LORIS value. This could result in a theoretical attacker with publication module access forging an email to an external domain under the attacker's control which appeared to come from LORIS. This vulnerability is fixed in 27.0.3 and 28.0.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-21
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
mcgill loris 28.0.0
mcgill loris From 20.0.0 (inc) to 27.0.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-59 The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the publication module of the LORIS web application versions 20.0.0 through 27.0.2 and 28.0.0. The system incorrectly trusts the baseURL parameter submitted by a user's POST request instead of using an internally defined base URL.

Because of this, an attacker with access to the publication module can forge emails that appear to come from the LORIS system but contain links to external domains controlled by the attacker.

The root cause is that the notify function accepted user-supplied baseURL values and included them in email notifications, allowing potential phishing or redirection attacks.

This issue has been fixed by removing the baseURL parameter from the notify function and updating email templates to avoid direct URL links.


How can this vulnerability impact me? :

An attacker with access to the publication module could exploit this vulnerability to send forged emails that appear to originate from the LORIS system but actually contain links to malicious external sites.

This could lead to phishing attacks or users being redirected to attacker-controlled domains, potentially compromising user trust or leading to further exploitation.

The vulnerability has a low severity score (CVSS 3.5) and requires low privileges and user interaction, so the impact is limited but still notable in environments where the publication module is accessible.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the publication module of LORIS incorrectly trusting the baseURL parameter submitted via a user's POST request. Detection would involve monitoring or inspecting POST requests to the publication module endpoint to see if the baseURL parameter is being supplied or manipulated.

Since the vulnerability is related to the content of POST requests and email notifications generated by the system, detection could include reviewing logs for suspicious POST requests containing unusual or external baseURL values.

No specific commands are provided in the available resources to detect this vulnerability directly.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade LORIS to version 27.0.3 or later, or 28.0.1 or later, where the vulnerability has been fixed by removing the user-supplied baseURL parameter from the publication module.

If upgrading immediately is not possible, a workaround is to disable the publication module if it is not in use, to prevent exploitation.

Additionally, reviewing and restricting access to the publication module to trusted users can reduce the risk of exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker with access to the publication module to forge emails that appear to come from the LORIS system but direct recipients to external domains controlled by the attacker. This could potentially facilitate phishing attacks or mislead users, which may indirectly impact compliance with standards that require protection against unauthorized data manipulation or phishing, such as GDPR or HIPAA.

However, the CVE description and resources do not explicitly mention any direct impact on confidentiality, integrity, or availability of personal data, nor do they specify compliance violations with regulations like GDPR or HIPAA.

The vulnerability is classified as low severity with no confidentiality impact and only low integrity impact, suggesting limited direct compliance risk, but organizations should consider the phishing risk in their overall security posture.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart