CVE-2025-54593
BaseFortify
Publication date: 2025-08-01
Last updated on: 2025-08-25
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freshrss | freshrss | to 1.26.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in FreshRSS versions 1.26.1 and below allows an authenticated administrator to execute arbitrary code on the server by modifying the update URL to one they control and then running an update. This code execution can lead to exfiltration of user data, including hashed passwords, defacement of the instance if file permissions allow, and insertion of malicious code to steal plaintext passwords.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to unauthorized code execution on the FreshRSS server, resulting in theft of user data such as hashed and plaintext passwords, defacement of the service, and potential compromise of the entire instance.
What immediate steps should I take to mitigate this vulnerability?
Upgrade FreshRSS to version 1.26.2 or later to fix the vulnerability. Additionally, restrict administrator access to trusted users only and review update URL configurations to ensure they are not pointing to untrusted sources.