Home

Description

Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Versions 1.7.0 and below allow users to upload files without proper content validation or sanitization. By embedding malicious JavaScript within an SVG (or other active content formats such as HTML or XML), an attacker can achieve script execution in the context of the application's origin when a victim views the file in “raw” mode. This results in a stored Cross-Site Scripting (XSS) vulnerability that can be exploited to exfiltrate user data. This issue has been fixed in version 1.7.1.

PUBLISHED Reserved 2026-02-17 | Published 2026-02-20 | Updated 2026-02-23 | Assigner GitHub_M




MEDIUM: 4.6CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.7.1
affected

References

github.com/.../Flare/security/advisories/GHSA-q8fp-w6m5-4gjm

github.com/...ommit/7763d7b954799552f287ab9260bb1353f8880163

github.com/FlintSH/Flare/releases/tag/v1.7.1

cve.org (CVE-2026-26993)

nvd.nist.gov (CVE-2026-26993)

Download JSON