LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-26985

CVE-2026-26985 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: February 27, 2026

LORIS - Path Traversal

Published: February 25, 2026Updated: February 27, 2026Remote Exploitable

Overview

LORIS 24.0.0 to before 26.0.5, 27.0.2, and 28.0.0 contains a path traversal caused by improper validation in electrophysiogy_browser module, letting authenticated users with permissions read configuration files containing hard-coded credentials.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 3.8%(Probability of exploitation in next 30 days)

Impact

Authenticated attackers can read sensitive configuration files, potentially leading to credential compromise and unauthorized access to database or services.

Mitigation

Upgrade to version 26.0.5, 27.0.2, 28.0.0 or later. Alternatively, disable electrophysiogy_browser module as a workaround.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 26, 2026

🟠 CVE-2026-26985 - High (8.1) LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Starting in version 24.0.0 and prior to versions 26.0.5, 27.0.2, and 28.0.0, an authenti... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-26985/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-26985
Severity
High
CVSS Score
8.1
Type
path_traversal
Status
unconfirmed
EPSS
3.8%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS Score

3.8%Probability of exploitation in the next 30 days