Vulnerability Description
FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.1 and below, an authenticated administrator user can execute arbitrary code on the FreshRSS server by modifying the update URL to one they control, and gain code execution after running an update. After successfully executing code, user data including hashed passwords can be exfiltrated, the instance can be defaced when file permissions allow. Malicious code can be inserted into the instance to steal plaintext passwords, among others. This is fixed in version 1.26.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freshrss | Freshrss | < 1.26.2 |
Related Weaknesses (CWE)
References
- https://github.com/FreshRSS/FreshRSS/commit/dbdadbb4107878d9233f635c31a88afe4595Patch
- https://github.com/FreshRSS/FreshRSS/pull/7477Issue Tracking
- https://github.com/FreshRSS/FreshRSS/releases/tag/1.26.2Release Notes
- https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-jcww-48g9-wf57ExploitVendor Advisory
FAQ
What is CVE-2025-54593?
CVE-2025-54593 is a vulnerability with a CVSS score of 7.2 (HIGH). FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.1 and below, an authenticated administrator user can execute arbitrary code on the FreshRSS server by modifying the update URL to one...
How severe is CVE-2025-54593?
CVE-2025-54593 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-54593?
Check the references section above for vendor advisories and patch information. Affected products include: Freshrss Freshrss.