🔐 CVE Alert

CVE-2025-68402

UNKNOWN 0.0

FreshRSS has an authentication bypass due to truncated bcrypt hash [edge branch]

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

FreshRSS is a free, self-hostable RSS aggregator. From 57e1a37 - 00f2f04, the lengths of the nonce was changed from 40 chars to 64. password_verify() is currently being called with a constructed string (SHA-256 nonce + part of a bcrypt hash) instead of the raw user password. Due to bcrypt’s 72-byte input truncation, this causes password verification to succeed even when the user enters an incorrect password. This vulnerability is fixed in 1.27.2-dev (476e57b). The issue was only present in the edge branch and never in a stable release.

CWE CWE-287
Vendor freshrss
Product freshrss
Published Mar 9, 2026
Last Updated Mar 9, 2026
Stay Ahead of the Next One

Get instant alerts for freshrss freshrss

Be the first to know when new unknown vulnerabilities affecting freshrss freshrss are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

FreshRSS / FreshRSS
< 476e57b04646416e24e24c56133c9fadf9e52b95

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-pcq9-mq6m-mvmp github.com: https://github.com/FreshRSS/FreshRSS/pull/8061 github.com: https://github.com/FreshRSS/FreshRSS/pull/8320 github.com: https://github.com/FreshRSS/FreshRSS/commit/476e57b04646416e24e24c56133c9fadf9e52b95