CVE-2025-31134: CWE-201: Insertion of Sensitive Information Into Sent Data in FreshRSS FreshRSS
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, an attacker can gain additional information about the server by checking if certain directories exist. An attacker can, for example, check if older PHP versions are installed or if certain software is installed on the server and potentially use that information to further attack the server. Version 1.26.2 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-31134 is a medium severity vulnerability affecting FreshRSS, a self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability is categorized under CWE-201, which involves the insertion of sensitive information into sent data. Specifically, an attacker can remotely probe the server hosting FreshRSS to determine the existence of certain directories. This reconnaissance can reveal critical information such as the presence of older PHP versions or other installed software components. Such information disclosure can aid attackers in crafting more targeted and effective attacks by identifying potential weaknesses or unpatched software on the server. The vulnerability requires no authentication or user interaction and can be exploited over the network, making it accessible to any remote attacker. The CVSS 4.0 base score is 5.5 (medium), reflecting the moderate impact of information disclosure without direct compromise of confidentiality, integrity, or availability. The issue was addressed in FreshRSS version 1.26.2, which includes patches to prevent directory existence checks from leaking sensitive server information. No known exploits are currently reported in the wild, but the vulnerability presents a risk by facilitating attacker reconnaissance.
Potential Impact
For European organizations using FreshRSS for internal or public RSS feed aggregation, this vulnerability poses a risk primarily through information disclosure. Attackers can gather intelligence about server configurations, such as outdated PHP versions or installed software, which can be leveraged to identify further exploitable vulnerabilities. This can lead to subsequent attacks that compromise confidentiality, integrity, or availability of organizational data and services. While the vulnerability itself does not directly allow code execution or data manipulation, it lowers the attacker's effort and increases the likelihood of successful exploitation of other vulnerabilities. Organizations in sectors with high reliance on web services, such as media, education, and government entities, may be particularly impacted if FreshRSS is part of their infrastructure. Additionally, since FreshRSS is self-hosted, the security posture depends heavily on the administrators’ patch management and server hardening practices. Failure to update to version 1.26.2 or later leaves organizations exposed to reconnaissance activities that can precede more severe attacks.
Mitigation Recommendations
European organizations should immediately upgrade all FreshRSS instances to version 1.26.2 or later to apply the official patch addressing this vulnerability. Beyond patching, administrators should implement strict access controls to limit exposure of the FreshRSS server to trusted networks only, reducing the attack surface. Employing web application firewalls (WAFs) can help detect and block suspicious probing activities targeting directory enumeration. Regularly auditing server configurations and removing or restricting access to legacy software versions, such as outdated PHP installations, will reduce the value of information disclosed if reconnaissance occurs. Additionally, monitoring server logs for unusual directory access patterns can provide early indicators of attempted exploitation. Organizations should also consider network segmentation to isolate FreshRSS servers from critical infrastructure and apply the principle of least privilege to all services and users interacting with the server.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-31134: CWE-201: Insertion of Sensitive Information Into Sent Data in FreshRSS FreshRSS
Description
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, an attacker can gain additional information about the server by checking if certain directories exist. An attacker can, for example, check if older PHP versions are installed or if certain software is installed on the server and potentially use that information to further attack the server. Version 1.26.2 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-31134 is a medium severity vulnerability affecting FreshRSS, a self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability is categorized under CWE-201, which involves the insertion of sensitive information into sent data. Specifically, an attacker can remotely probe the server hosting FreshRSS to determine the existence of certain directories. This reconnaissance can reveal critical information such as the presence of older PHP versions or other installed software components. Such information disclosure can aid attackers in crafting more targeted and effective attacks by identifying potential weaknesses or unpatched software on the server. The vulnerability requires no authentication or user interaction and can be exploited over the network, making it accessible to any remote attacker. The CVSS 4.0 base score is 5.5 (medium), reflecting the moderate impact of information disclosure without direct compromise of confidentiality, integrity, or availability. The issue was addressed in FreshRSS version 1.26.2, which includes patches to prevent directory existence checks from leaking sensitive server information. No known exploits are currently reported in the wild, but the vulnerability presents a risk by facilitating attacker reconnaissance.
Potential Impact
For European organizations using FreshRSS for internal or public RSS feed aggregation, this vulnerability poses a risk primarily through information disclosure. Attackers can gather intelligence about server configurations, such as outdated PHP versions or installed software, which can be leveraged to identify further exploitable vulnerabilities. This can lead to subsequent attacks that compromise confidentiality, integrity, or availability of organizational data and services. While the vulnerability itself does not directly allow code execution or data manipulation, it lowers the attacker's effort and increases the likelihood of successful exploitation of other vulnerabilities. Organizations in sectors with high reliance on web services, such as media, education, and government entities, may be particularly impacted if FreshRSS is part of their infrastructure. Additionally, since FreshRSS is self-hosted, the security posture depends heavily on the administrators’ patch management and server hardening practices. Failure to update to version 1.26.2 or later leaves organizations exposed to reconnaissance activities that can precede more severe attacks.
Mitigation Recommendations
European organizations should immediately upgrade all FreshRSS instances to version 1.26.2 or later to apply the official patch addressing this vulnerability. Beyond patching, administrators should implement strict access controls to limit exposure of the FreshRSS server to trusted networks only, reducing the attack surface. Employing web application firewalls (WAFs) can help detect and block suspicious probing activities targeting directory enumeration. Regularly auditing server configurations and removing or restricting access to legacy software versions, such as outdated PHP installations, will reduce the value of information disclosed if reconnaissance occurs. Additionally, monitoring server logs for unusual directory access patterns can provide early indicators of attempted exploitation. Organizations should also consider network segmentation to isolate FreshRSS servers from critical infrastructure and apply the principle of least privilege to all services and users interacting with the server.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-03-26T15:04:52.627Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6840a1e1182aa0cae2bbf440
Added to database: 6/4/2025, 7:43:29 PM
Last enriched: 7/6/2025, 7:11:02 PM
Last updated: 1/7/2026, 4:22:18 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.