LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-26984

CVE-2026-26984 - Vulnerability Analysis

HighCVSS: 8.7

Last Updated: February 27, 2026

LORIS - Path Traversal & Remote Code Execution

Published: February 25, 2026Updated: February 27, 2026Remote Exploitable

Overview

LORIS < 26.0.5, < 27.0.2, < 28.0.0 contains a path traversal vulnerability caused by improper file upload handling in the media module, letting authenticated users with privileges upload malicious files and achieve remote code execution, exploit requires appropriate user permissions.

Severity & Score

Severity: High
CVSS Score: 8.7
EPSS Score: 9.9%(Probability of exploitation in next 30 days)

Impact

Authenticated attackers with privileges can upload malicious files and execute code remotely, potentially compromising the server.

Mitigation

Upgrade to LORIS v26.0.5, v27.0.2, v28.0.0 or later; alternatively, disable the media module if unused.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 26, 2026

🟠 CVE-2026-26984 - High (8.7) LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to versions 26.0.5, 27.0.2, and 28.0.0, an authenticated user with sufficient priv... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-26984/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-26984
Severity
High
CVSS Score
8.7
Type
path_traversal
Status
unconfirmed
EPSS
9.9%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

EPSS Score

9.9%Probability of exploitation in the next 30 days