CVE-2025-62166
FreshRSS has an IDOR which allows for viewing feeds of any user and leaking tokens
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
FreshRSS is a free, self-hostable RSS aggregator. Prior 1.28.0, a bug in the auth logic related to master authentication tokens, this restriction is bypassed. Usually only the default user's feed should be viewable if anonymous viewing is enabled, and feeds of other users should be private. This vulnerability is fixed in 1.28.0.
| CWE | CWE-284 CWE-639 |
| Vendor | freshrss |
| Product | freshrss |
| Published | Mar 9, 2026 |
| Last Updated | Mar 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for freshrss freshrss
Be the first to know when new high vulnerabilities affecting freshrss freshrss are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
FreshRSS / FreshRSS
< 1.28.0
References
github.com: https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w743-fg6g-mhwh github.com: https://github.com/FreshRSS/FreshRSS/pull/8165 github.com: https://github.com/FreshRSS/FreshRSS/commit/60cf5ea297a17db861e73cd65d7b7862bd6bcc24 github.com: https://github.com/FreshRSS/FreshRSS/releases/tag/1.28.0