FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue.
References
Link | Resource |
---|---|
https://github.com/FreshRSS/FreshRSS/commit/3776e1e48f33e80eb4b674bb64b419caf3b5a4e2 | Patch |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8f79-3q3w-43c4 | Exploit Vendor Advisory |
Configurations
History
12 Aug 2025, 15:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FreshRSS/FreshRSS/commit/3776e1e48f33e80eb4b674bb64b419caf3b5a4e2 - Patch | |
References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8f79-3q3w-43c4 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* | |
First Time |
Freshrss
Freshrss freshrss |
05 Jun 2025, 20:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jun 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-04 20:15
Updated : 2025-08-12 15:33
NVD link : CVE-2025-46339
Mitre link : CVE-2025-46339
CVE.ORG link : CVE-2025-46339
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data