FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below expose information about feeds and tags of default admin users, due to lack of access checking in the FreshRSS_Auth::hasAccess() function used by some of the tag/feed related endpoints. FreshRSS controllers usually have a defined firstAction() method with an override to make sure that every action requires access. If one doesn't, then every action has to check for access manually, and certain endpoints use neither the firstAction() method, or do they perform a manual access check. This issue is fixed in version 1.27.0.
History

Tue, 30 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Freshrss
Freshrss freshrss
Vendors & Products Freshrss
Freshrss freshrss

Mon, 29 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Description FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below expose information about feeds and tags of default admin users, due to lack of access checking in the FreshRSS_Auth::hasAccess() function used by some of the tag/feed related endpoints. FreshRSS controllers usually have a defined firstAction() method with an override to make sure that every action requires access. If one doesn't, then every action has to check for access manually, and certain endpoints use neither the firstAction() method, or do they perform a manual access check. This issue is fixed in version 1.27.0.
Title FreshRSS: Unauthenticated users can view default user's information
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-30T15:02:37.861Z

Reserved: 2025-07-25T16:19:16.095Z

Link: CVE-2025-54591

cve-icon Vulnrichment

Updated: 2025-09-30T15:02:34.613Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-29T21:15:37.990

Modified: 2025-10-02T19:12:42.843

Link: CVE-2025-54591

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-30T08:47:41Z