No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flintsh
Flintsh flare |
|
| Vendors & Products |
Flintsh
Flintsh flare |
Fri, 20 Feb 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Versions 1.7.0 and below allow users to upload files without proper content validation or sanitization. By embedding malicious JavaScript within an SVG (or other active content formats such as HTML or XML), an attacker can achieve script execution in the context of the application's origin when a victim views the file in “raw” mode. This results in a stored Cross-Site Scripting (XSS) vulnerability that can be exploited to exfiltrate user data. This issue has been fixed in version 1.7.1. | |
| Title | Flare has XSS vulnerability in Raw File Preview | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-23T18:09:14.053Z
Reserved: 2026-02-17T01:41:24.606Z
Link: CVE-2026-26993
Updated: 2026-02-23T18:09:08.264Z
Status : Awaiting Analysis
Published: 2026-02-20T03:16:01.153
Modified: 2026-02-20T13:49:47.623
Link: CVE-2026-26993
No data.
OpenCVE Enrichment
Updated: 2026-02-20T09:52:46Z