CVE-2025-46339: CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data in FreshRSS FreshRSS
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-46339 is a medium-severity vulnerability affecting FreshRSS, a self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability arises from improper handling of feed favicon URLs when a proxy is used with SSL verification disabled. Specifically, the favicon hash computation only includes the feed URL and a salt but omits critical variables such as the proxy address, proxy protocol, and SSL verification status. This omission allows an attacker who can intercept or control the proxy response to poison the favicon of any feed by substituting the favicon URL with one under their control. Consequently, all users of the affected FreshRSS instance can have their feed favicons replaced with malicious or misleading icons. While this does not directly compromise confidentiality or availability, it impacts integrity by allowing unauthorized modification of displayed feed icons, potentially facilitating phishing or social engineering attacks by misleading users about the source or authenticity of feeds. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely over the network (AV:N). The issue was addressed in FreshRSS version 1.26.2 by including the missing proxy-related variables in the favicon hash computation, preventing favicon poisoning via proxy manipulation.
Potential Impact
For European organizations using FreshRSS to aggregate RSS feeds internally or publicly, this vulnerability could undermine trust in feed content presentation by allowing attackers to spoof favicons. Although the core feed content is not directly altered, favicon poisoning can be leveraged in targeted phishing campaigns or misinformation efforts by visually associating malicious feeds with trusted sources. This may lead to decreased user confidence, potential exposure to malicious links if users are deceived, and reputational damage. Organizations relying on FreshRSS for critical information dissemination or monitoring could face operational disruptions if users ignore or mistrust feed updates due to altered favicons. However, since the vulnerability does not allow direct code execution or data exfiltration, the impact is primarily on integrity and user perception rather than confidentiality or availability.
Mitigation Recommendations
European organizations should promptly upgrade all FreshRSS instances to version 1.26.2 or later to ensure the favicon hash computation includes proxy parameters, eliminating the favicon poisoning vector. Additionally, organizations should enforce strict proxy configurations with SSL verification enabled to prevent interception or manipulation of feed responses. Network-level protections such as TLS inspection and proxy hardening can reduce the risk of man-in-the-middle attacks. Monitoring feed favicon changes and implementing alerting on unexpected favicon modifications can help detect exploitation attempts. Where feasible, restricting feed sources to trusted domains and validating feed content integrity can further mitigate risks. Finally, educating users about the potential for favicon spoofing and encouraging vigilance when interacting with feed content can reduce social engineering risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-46339: CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data in FreshRSS FreshRSS
Description
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-46339 is a medium-severity vulnerability affecting FreshRSS, a self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability arises from improper handling of feed favicon URLs when a proxy is used with SSL verification disabled. Specifically, the favicon hash computation only includes the feed URL and a salt but omits critical variables such as the proxy address, proxy protocol, and SSL verification status. This omission allows an attacker who can intercept or control the proxy response to poison the favicon of any feed by substituting the favicon URL with one under their control. Consequently, all users of the affected FreshRSS instance can have their feed favicons replaced with malicious or misleading icons. While this does not directly compromise confidentiality or availability, it impacts integrity by allowing unauthorized modification of displayed feed icons, potentially facilitating phishing or social engineering attacks by misleading users about the source or authenticity of feeds. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely over the network (AV:N). The issue was addressed in FreshRSS version 1.26.2 by including the missing proxy-related variables in the favicon hash computation, preventing favicon poisoning via proxy manipulation.
Potential Impact
For European organizations using FreshRSS to aggregate RSS feeds internally or publicly, this vulnerability could undermine trust in feed content presentation by allowing attackers to spoof favicons. Although the core feed content is not directly altered, favicon poisoning can be leveraged in targeted phishing campaigns or misinformation efforts by visually associating malicious feeds with trusted sources. This may lead to decreased user confidence, potential exposure to malicious links if users are deceived, and reputational damage. Organizations relying on FreshRSS for critical information dissemination or monitoring could face operational disruptions if users ignore or mistrust feed updates due to altered favicons. However, since the vulnerability does not allow direct code execution or data exfiltration, the impact is primarily on integrity and user perception rather than confidentiality or availability.
Mitigation Recommendations
European organizations should promptly upgrade all FreshRSS instances to version 1.26.2 or later to ensure the favicon hash computation includes proxy parameters, eliminating the favicon poisoning vector. Additionally, organizations should enforce strict proxy configurations with SSL verification enabled to prevent interception or manipulation of feed responses. Network-level protections such as TLS inspection and proxy hardening can reduce the risk of man-in-the-middle attacks. Monitoring feed favicon changes and implementing alerting on unexpected favicon modifications can help detect exploitation attempts. Where feasible, restricting feed sources to trusted domains and validating feed content integrity can further mitigate risks. Finally, educating users about the potential for favicon spoofing and encouraging vigilance when interacting with feed content can reduce social engineering risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-22T22:41:54.912Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6840c579182aa0cae2c16b09
Added to database: 6/4/2025, 10:15:21 PM
Last enriched: 7/7/2025, 2:42:39 AM
Last updated: 8/7/2025, 7:00:46 AM
Views: 18
Related Threats
CVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumCVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.