FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.1 and below, an authenticated administrator user can execute arbitrary code on the FreshRSS server by modifying the update URL to one they control, and gain code execution after running an update. After successfully executing code, user data including hashed passwords can be exfiltrated, the instance can be defaced when file permissions allow. Malicious code can be inserted into the instance to steal plaintext passwords, among others. This is fixed in version 1.26.2.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Aug 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freshrss
Freshrss freshrss |
|
Vendors & Products |
Freshrss
Freshrss freshrss |
Fri, 01 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 01 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.1 and below, an authenticated administrator user can execute arbitrary code on the FreshRSS server by modifying the update URL to one they control, and gain code execution after running an update. After successfully executing code, user data including hashed passwords can be exfiltrated, the instance can be defaced when file permissions allow. Malicious code can be inserted into the instance to steal plaintext passwords, among others. This is fixed in version 1.26.2. | |
Title | FreshRSS is vulnerable to RCE attacks by authenticated admin | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-01T18:04:40.265Z
Updated: 2025-08-01T18:32:59.897Z
Reserved: 2025-07-25T16:19:16.095Z
Link: CVE-2025-54593

Updated: 2025-08-01T18:32:55.941Z

Status : Awaiting Analysis
Published: 2025-08-01T18:15:55.740
Modified: 2025-08-04T15:06:15.833
Link: CVE-2025-54593

No data.