Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26984: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aces Loris

0
High
VulnerabilityCVE-2026-26984cvecve-2026-26984cwe-22cwe-434
Published: Wed Feb 25 2026 (02/25/2026, 21:15:54 UTC)
Source: CVE Database V5
Vendor/Project: aces
Product: Loris

Description

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to versions 26.0.5, 27.0.2, and 28.0.0, an authenticated user with sufficient privileges can exploit a path traversal vulnerability to upload a malicious file to an arbitrary location on the server. Once uploaded, the file can be used to achieve remote code execution (RCE). An attacker must be authenticated and have the appropriate permissions to exploit this issue. If the server is configured as read-only, remote code execution (RCE) is not possible; however, the malicious file upload may still be achievable. This problem is fixed in LORIS v26.0.5 and above, v27.0.2 and above, and v28.0.0 and above. As a workaround, LORIS administrators can disable the media module if it is not being used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:59:07 UTC

Technical Analysis

LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application widely used for managing neuroimaging research data and projects. CVE-2026-26984 identifies a path traversal vulnerability (CWE-22) combined with improper file upload handling (CWE-434) in LORIS versions prior to 26.0.5, between 27.0.0 and 27.0.2, and before 28.0.0. The vulnerability allows an authenticated user with sufficient privileges to manipulate file upload paths, enabling the placement of malicious files outside intended directories. This can lead to remote code execution (RCE) if the server permits write operations, as the attacker can upload executable payloads to arbitrary locations. The vulnerability requires no user interaction beyond authentication and appropriate permissions, making it a direct threat to systems where privileged users might be compromised or act maliciously. The vulnerability is mitigated by patching to fixed versions or disabling the media module if it is not in use. The CVSS v3.0 score of 8.7 reflects high impact on confidentiality and integrity, with network attack vector, low attack complexity, and high privileges required. No public exploits have been reported yet, but the potential for RCE makes this a critical issue for affected deployments.

Potential Impact

The primary impact of CVE-2026-26984 is the potential for attackers to achieve remote code execution on servers running vulnerable versions of LORIS. This can lead to full compromise of the affected system, unauthorized access to sensitive neuroimaging research data, and disruption of research operations. Confidentiality is severely impacted as attackers can access or exfiltrate sensitive data. Integrity is also compromised since attackers can modify or replace files, potentially injecting malicious code or altering research data. Availability impact is limited unless attackers use RCE to disrupt services. Since exploitation requires authenticated access with sufficient privileges, the risk is elevated in environments where user credentials are weak, reused, or compromised. Organizations relying on LORIS for critical research data management face risks of data breaches, intellectual property theft, and operational downtime. The vulnerability also poses reputational risks and potential regulatory compliance issues related to data protection.

Mitigation Recommendations

1. Immediately upgrade LORIS installations to versions 26.0.5 or later, 27.0.2 or later, or 28.0.0 or later as applicable to ensure the vulnerability is patched. 2. If upgrading is not immediately feasible, disable the media module to prevent file uploads through the vulnerable component. 3. Enforce strict access controls and least privilege principles to limit the number of users with permissions to upload files or manage media. 4. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise for privileged users. 5. Monitor server file systems for unauthorized file creations or modifications, especially outside expected directories. 6. Conduct regular audits of user privileges and review logs for suspicious activity related to file uploads. 7. Harden server configurations to enforce read-only permissions where possible, limiting the ability to write files and execute code. 8. Employ network segmentation and application-layer firewalls to restrict access to LORIS servers. 9. Educate users with upload privileges about the risks and signs of compromise. 10. Prepare incident response plans specific to potential RCE scenarios involving LORIS.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T01:41:24.605Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6d86b7ef31ef0b587d27

Added to database: 2/25/2026, 9:45:42 PM

Last enriched: 2/26/2026, 9:59:07 PM

Last updated: 4/12/2026, 12:48:39 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses