CVE-2026-30231
Received Received - Intake
Insecure Direct Object Reference in Flare File Routes Allows Unauthorized Access

Publication date: 2026-03-06

Last updated on: 2026-04-09

Assigner: GitHub, Inc.

Description
Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to version 1.7.2, the raw and direct file routes only block unauthenticated users from accessing private files. Any authenticated, non‑owner user who knows the file URL can retrieve the content, which is inconsistent with stricter checks used by other endpoints. This issue has been patched in version 1.7.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-06
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
flintsh flare to 1.7.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30231 is an Insecure Direct Object Reference (IDOR) vulnerability in the FlintSH/Flare file sharing platform versions prior to 1.7.2. The issue exists in the raw and direct file access endpoints, which only block unauthenticated users from accessing private files. However, any authenticated user who knows the file URL can access private files even if they are not the owner or an admin.

This happens because these endpoints check only if a user is authenticated, not whether the user owns the file or has administrative privileges. This is inconsistent with other endpoints like download and thumbnail routes, which enforce stricter access controls.

The vulnerability allows unauthorized disclosure of confidential private files to any authenticated user who can guess or obtain the file URL.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can lead to unauthorized access to private files by any authenticated user, even if they do not own the files or have administrative rights.'}, {'type': 'paragraph', 'content': 'As a result, confidential or sensitive information stored in private files could be exposed to unauthorized users, potentially leading to data breaches or leakage of sensitive information.'}, {'type': 'paragraph', 'content': "Because the access control is inconsistent, it undermines the confidentiality guarantees of the platform and could damage trust in the system's security."}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by verifying access control behavior on the raw and direct file endpoints of the Flare application. Specifically, you should test whether authenticated users who are not owners or admins can access private files by using known or guessed file URLs.'}, {'type': 'paragraph', 'content': 'Verification steps include ensuring that unauthenticated users and authenticated non-owners are denied access, while owners and admins are allowed, matching the behavior of other endpoints such as download and thumbnail routes.'}, {'type': 'paragraph', 'content': 'While no specific commands are provided, you can perform HTTP requests to the raw and direct file URLs with different user credentials to check access permissions. For example, using curl:'}, {'type': 'list_item', 'content': 'Test access as an unauthenticated user: curl -I https://your-flare-instance/raw/file-url'}, {'type': 'list_item', 'content': 'Test access as an authenticated non-owner user: curl -I -H "Authorization: Bearer <non-owner-token>" https://your-flare-instance/raw/file-url'}, {'type': 'list_item', 'content': 'Test access as the owner or admin user: curl -I -H "Authorization: Bearer <owner-or-admin-token>" https://your-flare-instance/raw/file-url'}, {'type': 'paragraph', 'content': 'If authenticated non-owner users can access private files, the vulnerability exists.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Flare application to version 1.7.2 or later, where this vulnerability has been patched.

The patch aligns the access control logic of the raw and direct file endpoints with the stricter checks used by other endpoints, ensuring that only file owners or admins can access private files.

If upgrading immediately is not possible, consider implementing temporary access control checks on the raw and direct endpoints to verify ownership or admin status before granting access, returning HTTP 403 or 404 responses otherwise.

Additionally, review and centralize access control logic in a shared utility to maintain consistency across all file access routes.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart