CVE-2026-26984 - Vulnerability Analysis
HighCVSS: 8.7Last Updated: February 27, 2026
LORIS - Path Traversal & Remote Code Execution
Overview
LORIS < 26.0.5, < 27.0.2, < 28.0.0 contains a path traversal vulnerability caused by improper file upload handling in the media module, letting authenticated users with privileges upload malicious files and achieve remote code execution, exploit requires appropriate user permissions.
Severity & Score
Impact
Authenticated attackers with privileges can upload malicious files and execute code remotely, potentially compromising the server.
Mitigation
Upgrade to LORIS v26.0.5, v27.0.2, v28.0.0 or later; alternatively, disable the media module if unused.
References
Social Media Activity(1 post)
š CVE-2026-26984 - High (8.7) LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to versions 26.0.5, 27.0.2, and 28.0.0, an authenticated user with sufficient priv... š https://www.thehackerwire.com/vulnerability/CVE-2026-26984/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-26984
- Severity
- High
- CVSS Score
- 8.7
- Type
- path_traversal
- Status
- unconfirmed
- EPSS
- 9.9%
- Social Posts
- 1
CWE
- CWE-22
CVSS Metrics
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N