Browse all 4 CVE security advisories affecting FlintSH. AI-powered Chinese analysis, POCs, and references for each vulnerability.
FlintSH is a command-line shell primarily used for system administration and network device management. Historically, it has been associated with multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues. The tool has accumulated four CVEs, highlighting recurring security concerns in its input validation and access control mechanisms. While no major public security incidents have been widely documented, its consistent vulnerability pattern suggests potential risks in environments where improper input handling or insufficient privilege checks exist. Administrators should implement strict input sanitization and least privilege principles when deploying FlintSH to mitigate exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-30942 | Flare has a Path Traversal in /api/avatars/[filename] — FlareCWE-22 | 6.5AI | MediumAI | 2026-03-10 |
| CVE-2026-30231 | Flare: Private File IDOR via raw/direct endpoints — FlareCWE-639 | 6.5 | - | 2026-03-06 |
| CVE-2026-30230 | Flare: Password‑Protected Thumbnail Bypass — FlareCWE-639 | 7.5 | - | 2026-03-06 |
| CVE-2026-26993 | Flare has XSS vulnerability in Raw File Preview — FlareCWE-79 | 4.6 | Medium | 2026-02-20 |
This page lists every published CVE security advisory associated with FlintSH. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.