{"api_version":"1","generated_at":"2026-04-09T20:37:52+00:00","cve":"CVE-2026-39985","urls":{"html":"https://cve.report/CVE-2026-39985","api":"https://cve.report/api/cve/CVE-2026-39985.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-39985","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-39985"},"summary":{"title":"LORIS has an open redirect field on login","description":"LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, the redirect parameter upon login to LORIS was not validating the value of the redirect as being within LORIS, which could be used to trick users into visiting arbitrary URLs if they are given a link with a third party redirect parameter. This vulnerability is fixed in 27.0.3 and 28.0.1.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-09 18:17:02","updated_at":"2026-04-09 18:17:02"},"problem_types":["CWE-601","CWE-601 CWE-601: URL Redirection to Untrusted Site ('Open Redirect')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/aces/Loris/commit/f57f54b42a076bf53ba86e20d4dbf37f63538f58","name":"https://github.com/aces/Loris/commit/f57f54b42a076bf53ba86e20d4dbf37f63538f58","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/aces/Loris/releases/tag/v27.0.3","name":"https://github.com/aces/Loris/releases/tag/v27.0.3","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/aces/Loris/releases/tag/v28.0.1","name":"https://github.com/aces/Loris/releases/tag/v28.0.1","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/aces/Loris/security/advisories/GHSA-rch2-f5fw-cg95","name":"https://github.com/aces/Loris/security/advisories/GHSA-rch2-f5fw-cg95","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-39985","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-39985","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"aces","product":"Loris","version":"affected < 27.0.3","platforms":[]},{"source":"CNA","vendor":"aces","product":"Loris","version":"affected >= 28.0.0, < 28.0.1","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"Loris","vendor":"aces","versions":[{"status":"affected","version":"< 27.0.3"},{"status":"affected","version":">= 28.0.0, < 28.0.1"}]}],"descriptions":[{"lang":"en","value":"LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, the redirect parameter upon login to LORIS was not validating the value of the redirect as being within LORIS, which could be used to trick users into visiting arbitrary URLs if they are given a link with a third party redirect parameter. This vulnerability is fixed in 27.0.3 and 28.0.1."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-601","description":"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-09T17:08:49.668Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/aces/Loris/security/advisories/GHSA-rch2-f5fw-cg95","tags":["x_refsource_CONFIRM"],"url":"https://github.com/aces/Loris/security/advisories/GHSA-rch2-f5fw-cg95"},{"name":"https://github.com/aces/Loris/commit/f57f54b42a076bf53ba86e20d4dbf37f63538f58","tags":["x_refsource_MISC"],"url":"https://github.com/aces/Loris/commit/f57f54b42a076bf53ba86e20d4dbf37f63538f58"},{"name":"https://github.com/aces/Loris/releases/tag/v27.0.3","tags":["x_refsource_MISC"],"url":"https://github.com/aces/Loris/releases/tag/v27.0.3"},{"name":"https://github.com/aces/Loris/releases/tag/v28.0.1","tags":["x_refsource_MISC"],"url":"https://github.com/aces/Loris/releases/tag/v28.0.1"}],"source":{"advisory":"GHSA-rch2-f5fw-cg95","discovery":"UNKNOWN"},"title":"LORIS has an open redirect field on login"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-39985","datePublished":"2026-04-09T17:08:49.668Z","dateReserved":"2026-04-08T00:01:47.628Z","dateUpdated":"2026-04-09T17:08:49.668Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-09 18:17:02","lastModifiedDate":"2026-04-09 18:17:02","problem_types":["CWE-601","CWE-601 CWE-601: URL Redirection to Untrusted Site ('Open Redirect')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"39985","Ordinal":"1","Title":"LORIS has an open redirect field on login","CVE":"CVE-2026-39985","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"39985","Ordinal":"1","NoteData":"LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, the redirect parameter upon login to LORIS was not validating the value of the redirect as being within LORIS, which could be used to trick users into visiting arbitrary URLs if they are given a link with a third party redirect parameter. This vulnerability is fixed in 27.0.3 and 28.0.1.","Type":"Description","Title":"LORIS has an open redirect field on login"}]}}}