Skip to main content

CVE-2025-31134: CWE-201: Insertion of Sensitive Information Into Sent Data in FreshRSS FreshRSS

Medium
VulnerabilityCVE-2025-31134cvecve-2025-31134cwe-201
Published: Wed Jun 04 2025 (06/04/2025, 19:35:55 UTC)
Source: CVE Database V5
Vendor/Project: FreshRSS
Product: FreshRSS

Description

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, an attacker can gain additional information about the server by checking if certain directories exist. An attacker can, for example, check if older PHP versions are installed or if certain software is installed on the server and potentially use that information to further attack the server. Version 1.26.2 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 07/06/2025, 19:11:02 UTC

Technical Analysis

CVE-2025-31134 is a medium severity vulnerability affecting FreshRSS, a self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability is categorized under CWE-201, which involves the insertion of sensitive information into sent data. Specifically, an attacker can remotely probe the server hosting FreshRSS to determine the existence of certain directories. This reconnaissance can reveal critical information such as the presence of older PHP versions or other installed software components. Such information disclosure can aid attackers in crafting more targeted and effective attacks by identifying potential weaknesses or unpatched software on the server. The vulnerability requires no authentication or user interaction and can be exploited over the network, making it accessible to any remote attacker. The CVSS 4.0 base score is 5.5 (medium), reflecting the moderate impact of information disclosure without direct compromise of confidentiality, integrity, or availability. The issue was addressed in FreshRSS version 1.26.2, which includes patches to prevent directory existence checks from leaking sensitive server information. No known exploits are currently reported in the wild, but the vulnerability presents a risk by facilitating attacker reconnaissance.

Potential Impact

For European organizations using FreshRSS for internal or public RSS feed aggregation, this vulnerability poses a risk primarily through information disclosure. Attackers can gather intelligence about server configurations, such as outdated PHP versions or installed software, which can be leveraged to identify further exploitable vulnerabilities. This can lead to subsequent attacks that compromise confidentiality, integrity, or availability of organizational data and services. While the vulnerability itself does not directly allow code execution or data manipulation, it lowers the attacker's effort and increases the likelihood of successful exploitation of other vulnerabilities. Organizations in sectors with high reliance on web services, such as media, education, and government entities, may be particularly impacted if FreshRSS is part of their infrastructure. Additionally, since FreshRSS is self-hosted, the security posture depends heavily on the administrators’ patch management and server hardening practices. Failure to update to version 1.26.2 or later leaves organizations exposed to reconnaissance activities that can precede more severe attacks.

Mitigation Recommendations

European organizations should immediately upgrade all FreshRSS instances to version 1.26.2 or later to apply the official patch addressing this vulnerability. Beyond patching, administrators should implement strict access controls to limit exposure of the FreshRSS server to trusted networks only, reducing the attack surface. Employing web application firewalls (WAFs) can help detect and block suspicious probing activities targeting directory enumeration. Regularly auditing server configurations and removing or restricting access to legacy software versions, such as outdated PHP installations, will reduce the value of information disclosed if reconnaissance occurs. Additionally, monitoring server logs for unusual directory access patterns can provide early indicators of attempted exploitation. Organizations should also consider network segmentation to isolate FreshRSS servers from critical infrastructure and apply the principle of least privilege to all services and users interacting with the server.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-03-26T15:04:52.627Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6840a1e1182aa0cae2bbf440

Added to database: 6/4/2025, 7:43:29 PM

Last enriched: 7/6/2025, 7:11:02 PM

Last updated: 7/31/2025, 6:19:35 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats