CVE-2026-26993

Source
https://cve.org/CVERecord?id=CVE-2026-26993
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26993.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26993
Aliases
  • GHSA-q8fp-w6m5-4gjm
Published
2026-02-20T02:33:16.709Z
Modified
2026-03-03T02:56:13.039825Z
Severity
  • 4.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Flare has XSS vulnerability in Raw File Preview
Details

Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Versions 1.7.0 and below allow users to upload files without proper content validation or sanitization. By embedding malicious JavaScript within an SVG (or other active content formats such as HTML or XML), an attacker can achieve script execution in the context of the application's origin when a victim views the file in “raw” mode. This results in a stored Cross-Site Scripting (XSS) vulnerability that can be exploited to exfiltrate user data. This issue has been fixed in version 1.7.1.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26993.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/flintsh/flare

Affected ranges

Type
GIT
Repo
https://github.com/flintsh/flare
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other
rolling
v1.*
v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.3.0
v1.3.1
v1.4.0
v1.4.1
v1.4.2
v1.5.0
v1.5.1
v1.5.2
v1.6.0
v1.6.1
v1.6.2
v1.7.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26993.json"