CVE-2025-54593
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-01

Last updated on: 2025-08-25

Assigner: GitHub, Inc.

Description
FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.1 and below, an authenticated administrator user can execute arbitrary code on the FreshRSS server by modifying the update URL to one they control, and gain code execution after running an update. After successfully executing code, user data including hashed passwords can be exfiltrated, the instance can be defaced when file permissions allow. Malicious code can be inserted into the instance to steal plaintext passwords, among others. This is fixed in version 1.26.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-01
Last Modified
2025-08-25
Generated
2026-05-07
AI Q&A
2025-08-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
freshrss freshrss to 1.26.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in FreshRSS versions 1.26.1 and below allows an authenticated administrator to execute arbitrary code on the server by modifying the update URL to one they control and then running an update. This code execution can lead to exfiltration of user data, including hashed passwords, defacement of the instance if file permissions allow, and insertion of malicious code to steal plaintext passwords.


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to unauthorized code execution on the FreshRSS server, resulting in theft of user data such as hashed and plaintext passwords, defacement of the service, and potential compromise of the entire instance.


What immediate steps should I take to mitigate this vulnerability?

Upgrade FreshRSS to version 1.26.2 or later to fix the vulnerability. Additionally, restrict administrator access to trusted users only and review update URL configurations to ensure they are not pointing to untrusted sources.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart