{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T06:25:02.186","vulnerabilities":[{"cve":{"id":"CVE-2026-26993","sourceIdentifier":"security-advisories@github.com","published":"2026-02-20T03:16:01.153","lastModified":"2026-03-03T17:35:32.257","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Versions 1.7.0 and below allow users to upload files without proper content validation or sanitization. By embedding malicious JavaScript within an SVG (or other active content formats such as HTML or XML), an attacker can achieve script execution in the context of the application's origin when a victim views the file in “raw” mode. This results in a stored Cross-Site Scripting (XSS) vulnerability that can be exploited to exfiltrate user data. This issue has been fixed in version 1.7.1."},{"lang":"es","value":"Flare es una plataforma autoalojable  para compartir archivos basada en Next.js que se integra con herramientas de captura de pantalla. Las versiones 1.7.0 e inferiores permiten a los usuarios subir archivos sin una validación o saneamiento de contenido adecuados. Al incrustar JavaScript malicioso dentro de un SVG (u otros formatos de contenido activo como HTML o XML), un atacante puede lograr la ejecución de scripts en el contexto del origen de la aplicación cuando una víctima ve el archivo en modo 'raw'. Esto resulta en una vulnerabilidad de cross-site scripting (XSS) almacenado que puede ser explotada para exfiltrar datos de usuario. Este problema ha sido solucionado en la versión 1.7.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:flintsh:flare:*:*:*:*:*:*:*:*","versionEndExcluding":"1.7.1","matchCriteriaId":"170C2076-8C10-4829-A9DC-35F79162D876"}]}]}],"references":[{"url":"https://github.com/FlintSH/Flare/commit/7763d7b954799552f287ab9260bb1353f8880163","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/FlintSH/Flare/releases/tag/v1.7.1","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/FlintSH/Flare/security/advisories/GHSA-q8fp-w6m5-4gjm","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}