FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below do not properly terminate the session during logout. After a user logs out, the session cookie remains active and unchanged. The unchanged cookie could be reused by an attacker if a new session were to be started. This failure to invalidate the session can lead to session hijacking and fixation vulnerabilities. This issue is fixed in version 1.27.0
References
| Link | Resource |
|---|---|
| https://github.com/FreshRSS/FreshRSS/pull/7762 | Patch |
| https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0 | Release Notes |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-42v4-65f8-5wgr | Exploit Vendor Advisory |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-42v4-65f8-5wgr | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-09-29 22:15
Updated : 2025-10-03 16:04
NVD link : CVE-2025-54592
Mitre link : CVE-2025-54592
CVE.ORG link : CVE-2025-54592
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-613
Insufficient Session Expiration
