FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* |
Wed, 04 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue. | |
| Title | FreshRSS vulnerable to favicon cache poisoning via proxy | |
| Weaknesses | CWE-349 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-04T20:04:54.504Z
Updated: 2025-06-04T20:48:49.550Z
Reserved: 2025-04-22T22:41:54.912Z
Link: CVE-2025-46339
Updated: 2025-06-04T20:48:45.506Z
Status : Analyzed
Published: 2025-06-04T20:15:23.817
Modified: 2025-08-12T15:33:57.800
Link: CVE-2025-46339
No data.