Freshrss

Freshrss

21 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 29.09.2025 21:15:37
  • Zuletzt bearbeitet 03.10.2025 16:06:32

FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below expose information about feeds and tags of default admin users, due to lack of access checking in the FreshRSS_Auth::hasAccess() function used by some of the tag/feed related...

  • EPSS 0.24%
  • Veröffentlicht 01.08.2025 18:04:40
  • Zuletzt bearbeitet 04.08.2025 15:06:15

FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.1 and below, an authenticated administrator user can execute arbitrary code on the FreshRSS server by modifying the update URL to one they control, and gain code execution after runni...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 04.06.2025 20:15:23
  • Zuletzt bearbeitet 12.08.2025 15:33:57

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 04.06.2025 20:15:23
  • Zuletzt bearbeitet 12.08.2025 15:31:20

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, HTML is sanitized improperly inside the `<iframe srcdoc>` attribute, which leads to cross-site scripting (XSS) by loading an attacker's UserJS inside `<script src>`. In order to ...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 04.06.2025 20:09:18
  • Zuletzt bearbeitet 12.08.2025 15:34:36

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, when the server is using HTTP auth via reverse proxy, it's possible to impersonate any user either via the `Remote-User` header or the `X-WebAuth-User` header by making specially...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 04.06.2025 19:50:58
  • Zuletzt bearbeitet 12.08.2025 15:21:32

FreshRSS is a self-hosted RSS feed aggregator. A vulnerability in versions prior to 1.26.2 causes a user to be repeatedly logged out after fetching a malicious feed entry, effectively causing that user to suffer denial of service. Version 1.26.2 cont...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 04.06.2025 19:42:15
  • Zuletzt bearbeitet 10.06.2025 15:08:13

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to run arbitrary JavaScript on the feeds page. This occurs by combining a cross-site scripting (XSS) issue that occurs in `f.php` when SVG favicons are downloaded f...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 04.06.2025 19:35:55
  • Zuletzt bearbeitet 10.06.2025 15:08:24

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, an attacker can gain additional information about the server by checking if certain directories exist. An attacker can, for example, check if older PHP versions are installed or ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 06.03.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:44:53

FreshRSS is a self-hosted RSS feed aggregator. When using the greader API, the provided password is logged in clear in `users/_/log_api.txt` in the case where the authentication fails. The issues occurs in `authorizationToUser()` in `greader.php`. If...

  • EPSS 0.4%
  • Veröffentlicht 09.12.2022 23:15:11
  • Zuletzt bearbeitet 21.11.2024 06:48:41

FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the A...