๐Ÿ” CVE Alert

CVE-2026-26984

HIGH 8.7

LORIS media module vulnerable to remote code execution

CVSS Score
8.7
EPSS Score
0.0%
EPSS Percentile
0th

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to versions 26.0.5, 27.0.2, and 28.0.0, an authenticated user with sufficient privileges can exploit a path traversal vulnerability to upload a malicious file to an arbitrary location on the server. Once uploaded, the file can be used to achieve remote code execution (RCE). An attacker must be authenticated and have the appropriate permissions to exploit this issue. If the server is configured as read-only, remote code execution (RCE) is not possible; however, the malicious file upload may still be achievable. This problem is fixed in LORIS v26.0.5 and above, v27.0.2 and above, and v28.0.0 and above. As a workaround, LORIS administrators can disable the media module if it is not being used.

CWE CWE-22 CWE-434
Vendor aces
Product loris
Published Feb 25, 2026
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for aces loris

Be the first to know when new high vulnerabilities affecting aces loris are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Affected Versions

aces / Loris
< 26.0.5 >= 27.0.0, < 27.0.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/aces/Loris/security/advisories/GHSA-mpgc-c48m-6v2h github.com: https://github.com/aces/Loris/releases/tag/v26.0.5 github.com: https://github.com/aces/Loris/releases/tag/v27.0.2