CVE-2026-39985
Received Received - Intake
Open Redirect Vulnerability in LORIS Login Redirect Parameter

Publication date: 2026-04-09

Last updated on: 2026-04-22

Assigner: GitHub, Inc.

Description
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, the redirect parameter upon login to LORIS was not validating the value of the redirect as being within LORIS, which could be used to trick users into visiting arbitrary URLs if they are given a link with a third party redirect parameter. This vulnerability is fixed in 27.0.3 and 28.0.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
mcgill loris 28.0.0
mcgill loris to 27.0.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is an open redirect issue that allows attackers to trick users into visiting arbitrary external URLs by manipulating the redirect parameter on login.

While the vulnerability has a low confidentiality impact and does not directly expose sensitive data, it could potentially be exploited in phishing or social engineering attacks, which may indirectly affect compliance with standards like GDPR or HIPAA that require protection against unauthorized access and user deception.

However, there is no explicit information in the provided context or resources linking this vulnerability directly to non-compliance with GDPR, HIPAA, or other common regulations.


Can you explain this vulnerability to me?

CVE-2026-39985 is an open redirect vulnerability in the LORIS web application, which is used for managing neuroimaging research data and projects.

Before versions 27.0.3 and 28.0.1, the login page's redirect parameter did not properly validate whether the URL provided for redirection was within the LORIS domain.

This flaw allowed attackers to craft login URLs with redirect parameters pointing to arbitrary external sites, potentially tricking users into visiting malicious URLs after login.

The vulnerability was fixed by adding validation to ensure that redirection only occurs within the same origin, preventing redirection to external sites.


How can this vulnerability impact me? :

This vulnerability can impact users by allowing attackers to redirect them to malicious external websites after login, potentially leading to phishing attacks or exposure to harmful content.

Since the redirect parameter was not validated, users could be tricked into clicking crafted links that appear legitimate but lead to untrusted sites.

The CVSS score of 4.3 indicates a moderate severity, with low complexity for exploitation and no privileges required, but user interaction is necessary.

The impact on confidentiality is low, with no impact on integrity or availability.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves an open redirect issue in the LORIS web application where the login redirect parameter is not properly validated. Detection involves checking if the LORIS instance is running a vulnerable version (prior to 27.0.3 or 28.0.1) and if the login redirect parameter can be manipulated to redirect to external URLs.

To detect this on your system, you can attempt to access the login page with a crafted redirect parameter pointing to an external URL and observe if the application redirects outside its domain.

  • Use curl or wget to test the login redirect behavior, for example: curl -I 'https://your-loris-instance/login?redirect=https://malicious.example.com'
  • Monitor web server logs for unusual redirect parameters or external URL redirects after login attempts.
  • Check the installed LORIS version by querying the application or inspecting the deployment to verify if it is older than 27.0.3 or 28.0.1.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade the LORIS application to version 27.0.3 or 28.0.1 or later, where the vulnerability has been fixed.

These versions include validation of the redirect parameter to ensure it only redirects within the same origin, preventing open redirect attacks.

Until the upgrade can be applied, consider monitoring and restricting suspicious redirect parameters and educating users to avoid clicking on untrusted login links.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart