| ID |
CVE-2026-35403
|
| Sažetak |
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 15.10 to before 27.0.3 and 28.0.1, there is a potential for a cross-site scripting attack in the survey_accounts module if a user provides an invalid visit label. While the data is properly JSON encoded, the Content-Type header is not set causing the web browser to interpret the payload as HTML, opening the possibility of a cross-site scripting if a user is tricked into following an invalid link. This vulnerability is fixed in 27.0.3 and 28.0.1. |
| Reference |
|
| CVSS |
| Base: | 6.5 |
| Impact: | 4.7 |
| Exploitability: | 1.3 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
LOW |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| HIGH |
LOW |
NONE |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N |
| Zadnje važnije ažuriranje |
21-04-2026 - 20:06 |
| Objavljeno |
08-04-2026 - 19:25 |