FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below do not properly terminate the session during logout. After a user logs out, the session cookie remains active and unchanged. The unchanged cookie could be reused by an attacker if a new session were to be started. This failure to invalidate the session can lead to session hijacking and fixation vulnerabilities. This issue is fixed in version 1.27.0
References
| Link | Resource |
|---|---|
| https://github.com/FreshRSS/FreshRSS/pull/7762 | Patch |
| https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0 | Release Notes |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-42v4-65f8-5wgr | Exploit Vendor Advisory |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-42v4-65f8-5wgr | Exploit Vendor Advisory |
Configurations
History
03 Oct 2025, 16:04
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Freshrss
Freshrss freshrss |
|
| CPE | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/FreshRSS/FreshRSS/pull/7762 - Patch | |
| References | () https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0 - Release Notes | |
| References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-42v4-65f8-5wgr - Exploit, Vendor Advisory |
30 Sep 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-42v4-65f8-5wgr - |
29 Sep 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-29 22:15
Updated : 2025-10-03 16:04
NVD link : CVE-2025-54592
Mitre link : CVE-2025-54592
CVE.ORG link : CVE-2025-54592
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-613
Insufficient Session Expiration
