CVE-2025-32015: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FreshRSS FreshRSS
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, HTML is sanitized improperly inside the `<iframe srcdoc>` attribute, which leads to cross-site scripting (XSS) by loading an attacker's UserJS inside `<script src>`. In order to execute the attack, the attacker needs to control one of the victim's feeds and have an account on the FreshRSS instance that the victim is using. An attacker can gain access to the victim's account by exploiting this vulnerability. If the victim is an admin it would be possible to delete all users (cause damage) or execute arbitrary code on the server by modifying the update URL using fetch() via the XSS. Version 1.26.2 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-32015 is a cross-site scripting (XSS) vulnerability affecting FreshRSS, a self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability arises from improper sanitization of HTML content within the <iframe srcdoc> attribute. Specifically, the sanitization fails to adequately neutralize malicious input, allowing an attacker to inject and execute arbitrary JavaScript code by loading a UserJS script inside a <script src> element. Exploitation requires the attacker to control one of the victim's RSS feeds and possess an account on the same FreshRSS instance. Once exploited, the attacker can hijack the victim's session and gain access to their account. If the victim holds administrative privileges, the attacker could perform destructive actions such as deleting all users or executing arbitrary code on the server by manipulating the update URL via fetch() calls within the XSS payload. This elevates the threat from a typical XSS to a potentially severe compromise of the entire FreshRSS instance. The vulnerability has been addressed in FreshRSS version 1.26.2, which includes proper sanitization to prevent this attack vector. The CVSS 3.1 base score is 6.7 (medium severity), reflecting the network attack vector, the requirement for low privileges and user interaction, and the high impact on confidentiality and integrity, with limited impact on availability. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using FreshRSS, especially those self-hosting the service for internal or public RSS feed aggregation, this vulnerability poses a significant risk. An attacker controlling a malicious feed and having an account could compromise user accounts, leading to unauthorized access to sensitive information aggregated in FreshRSS. Administrative account compromise could result in deletion of user accounts, disrupting operations, or even remote code execution on the server hosting FreshRSS, potentially leading to broader network compromise. This risk is heightened in environments where FreshRSS is integrated with other internal systems or where sensitive or proprietary information is aggregated. The requirement for an attacker to have an account limits the attack surface but does not eliminate risk, as account creation may be open or weakly controlled. The vulnerability could be exploited in targeted attacks against organizations relying on FreshRSS for information dissemination or monitoring, impacting confidentiality, integrity, and availability of their information systems.
Mitigation Recommendations
European organizations should immediately upgrade all FreshRSS instances to version 1.26.2 or later to apply the official patch that corrects the sanitization flaw. Additionally, organizations should audit user account creation policies to ensure only trusted users can register or be granted access, reducing the likelihood of attacker account creation. Implementing strict input validation and content security policies (CSP) can help mitigate the impact of any residual XSS vulnerabilities. Monitoring logs for unusual feed submissions or script injection attempts can provide early detection of exploitation attempts. For critical environments, consider isolating FreshRSS instances within segmented network zones to limit potential lateral movement if compromise occurs. Regular backups of user data and configurations should be maintained to enable recovery in case of destructive attacks. Finally, educating users and administrators about the risks of malicious feeds and the importance of applying security updates promptly is essential.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-32015: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in FreshRSS FreshRSS
Description
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, HTML is sanitized improperly inside the `<iframe srcdoc>` attribute, which leads to cross-site scripting (XSS) by loading an attacker's UserJS inside `<script src>`. In order to execute the attack, the attacker needs to control one of the victim's feeds and have an account on the FreshRSS instance that the victim is using. An attacker can gain access to the victim's account by exploiting this vulnerability. If the victim is an admin it would be possible to delete all users (cause damage) or execute arbitrary code on the server by modifying the update URL using fetch() via the XSS. Version 1.26.2 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-32015 is a cross-site scripting (XSS) vulnerability affecting FreshRSS, a self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability arises from improper sanitization of HTML content within the <iframe srcdoc> attribute. Specifically, the sanitization fails to adequately neutralize malicious input, allowing an attacker to inject and execute arbitrary JavaScript code by loading a UserJS script inside a <script src> element. Exploitation requires the attacker to control one of the victim's RSS feeds and possess an account on the same FreshRSS instance. Once exploited, the attacker can hijack the victim's session and gain access to their account. If the victim holds administrative privileges, the attacker could perform destructive actions such as deleting all users or executing arbitrary code on the server by manipulating the update URL via fetch() calls within the XSS payload. This elevates the threat from a typical XSS to a potentially severe compromise of the entire FreshRSS instance. The vulnerability has been addressed in FreshRSS version 1.26.2, which includes proper sanitization to prevent this attack vector. The CVSS 3.1 base score is 6.7 (medium severity), reflecting the network attack vector, the requirement for low privileges and user interaction, and the high impact on confidentiality and integrity, with limited impact on availability. No known exploits are currently reported in the wild.
Potential Impact
For European organizations using FreshRSS, especially those self-hosting the service for internal or public RSS feed aggregation, this vulnerability poses a significant risk. An attacker controlling a malicious feed and having an account could compromise user accounts, leading to unauthorized access to sensitive information aggregated in FreshRSS. Administrative account compromise could result in deletion of user accounts, disrupting operations, or even remote code execution on the server hosting FreshRSS, potentially leading to broader network compromise. This risk is heightened in environments where FreshRSS is integrated with other internal systems or where sensitive or proprietary information is aggregated. The requirement for an attacker to have an account limits the attack surface but does not eliminate risk, as account creation may be open or weakly controlled. The vulnerability could be exploited in targeted attacks against organizations relying on FreshRSS for information dissemination or monitoring, impacting confidentiality, integrity, and availability of their information systems.
Mitigation Recommendations
European organizations should immediately upgrade all FreshRSS instances to version 1.26.2 or later to apply the official patch that corrects the sanitization flaw. Additionally, organizations should audit user account creation policies to ensure only trusted users can register or be granted access, reducing the likelihood of attacker account creation. Implementing strict input validation and content security policies (CSP) can help mitigate the impact of any residual XSS vulnerabilities. Monitoring logs for unusual feed submissions or script injection attempts can provide early detection of exploitation attempts. For critical environments, consider isolating FreshRSS instances within segmented network zones to limit potential lateral movement if compromise occurs. Regular backups of user data and configurations should be maintained to enable recovery in case of destructive attacks. Finally, educating users and administrators about the risks of malicious feeds and the importance of applying security updates promptly is essential.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-01T21:57:32.953Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6840a8e8182aa0cae2bcf3ee
Added to database: 6/4/2025, 8:13:28 PM
Last enriched: 7/6/2025, 8:54:58 PM
Last updated: 8/3/2025, 8:39:43 AM
Views: 11
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.