FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below are vulnerable to directory enumeration by setting path in theme field, allowing attackers to gain additional information about the server by checking if certain directories exist. This issue is fixed in version 1.27.0.
References
| Link | Resource |
|---|---|
| https://github.com/FreshRSS/FreshRSS/commit/6549932d59aef3b72a9da29294af0f30ffb77af5 | Patch |
| https://github.com/FreshRSS/FreshRSS/pull/7722 | Patch |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f | Exploit Third Party Advisory |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-30 04:44
Updated : 2025-10-03 15:39
NVD link : CVE-2025-61586
Mitre link : CVE-2025-61586
CVE.ORG link : CVE-2025-61586
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
