Vulnerability Description
FreshRSS is a free, self-hostable RSS aggregator. From version 1.27.0 to before 1.28.0, An attacker could globally deny access to feeds via proxy modifying to 429 Retry-After for a large list of feeds on given instance, making it unusable for majority of users. This issue has been patched in version 1.28.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freshrss | Freshrss | >= 1.27.0, < 1.28.0 |
Related Weaknesses (CWE)
References
- https://github.com/FreshRSS/FreshRSS/commit/7d4854a0a4f5665db599f18c340357864656Patch
- https://github.com/FreshRSS/FreshRSS/pull/8029Issue Tracking
- https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-qw34-frg7-gf78ExploitPatchVendor Advisory
- https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-qw34-frg7-gf78ExploitPatchVendor Advisory
FAQ
What is CVE-2025-68148?
CVE-2025-68148 is a vulnerability with a CVSS score of 4.3 (MEDIUM). FreshRSS is a free, self-hostable RSS aggregator. From version 1.27.0 to before 1.28.0, An attacker could globally deny access to feeds via proxy modifying to 429 Retry-After for a large list of feeds...
How severe is CVE-2025-68148?
CVE-2025-68148 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-68148?
Check the references section above for vendor advisories and patch information. Affected products include: Freshrss Freshrss.