FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below are vulnerable to directory enumeration by setting path in theme field, allowing attackers to gain additional information about the server by checking if certain directories exist. This issue is fixed in version 1.27.0.
References
Link | Resource |
---|---|
https://github.com/FreshRSS/FreshRSS/commit/6549932d59aef3b72a9da29294af0f30ffb77af5 | Patch |
https://github.com/FreshRSS/FreshRSS/pull/7722 | Patch |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f | Exploit Third Party Advisory |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f | Exploit Third Party Advisory |
Configurations
History
03 Oct 2025, 15:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* | |
First Time |
Freshrss freshrss
Freshrss |
|
References | () https://github.com/FreshRSS/FreshRSS/commit/6549932d59aef3b72a9da29294af0f30ffb77af5 - Patch | |
References | () https://github.com/FreshRSS/FreshRSS/pull/7722 - Patch | |
References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
30 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f - |
30 Sep 2025, 04:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-30 04:44
Updated : 2025-10-03 15:39
NVD link : CVE-2025-61586
Mitre link : CVE-2025-61586
CVE.ORG link : CVE-2025-61586
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')