CVE-2025-46341: CWE-918: Server-Side Request Forgery (SSRF) in FreshRSS FreshRSS
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, when the server is using HTTP auth via reverse proxy, it's possible to impersonate any user either via the `Remote-User` header or the `X-WebAuth-User` header by making specially crafted requests via the add feed functionality and obtaining the CSRF token via XPath scraping. The attacker has to know the IP address of the proxied FreshRSS instance and the admin's username, while also having an account on the instance. An attacker can send specially crafted requests in order to gain unauthorized access to internal services. This can also lead to privilege escalation like in the demonstrated scenario, although users that have setup OIDC are not affected by privilege escalation. Version 1.26.2 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-46341 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting FreshRSS, a popular self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability arises when FreshRSS is deployed behind a reverse proxy that uses HTTP authentication. An attacker who knows the IP address of the proxied FreshRSS instance, the administrator's username, and who also has a valid user account on the instance, can exploit this flaw. By crafting malicious requests through the 'add feed' functionality and extracting the CSRF token via XPath scraping, the attacker can impersonate any user by manipulating the 'Remote-User' or 'X-WebAuth-User' HTTP headers. This impersonation enables unauthorized access to internal services and can lead to privilege escalation, allowing the attacker to gain higher privileges than their original account. Notably, setups using OpenID Connect (OIDC) for authentication are not vulnerable to the privilege escalation aspect of this issue. The vulnerability is tracked under CWE-918 (SSRF), which involves an attacker inducing the server to make HTTP requests to arbitrary locations, potentially bypassing network access controls. The vulnerability has a CVSS v3.1 score of 7.1, indicating a high severity level, with the attack vector being network-based, requiring low privileges and no user interaction, and impacting confidentiality significantly. The vulnerability was publicly disclosed on June 4, 2025, and patched in FreshRSS version 1.26.2. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using FreshRSS instances, especially those self-hosted behind reverse proxies with HTTP authentication, this vulnerability poses a significant risk. Exploitation can lead to unauthorized access to internal services, potentially exposing sensitive information or internal network resources. The privilege escalation capability means that attackers with limited user accounts can elevate their privileges, compromising the integrity of the system and potentially gaining administrative control. This could lead to data breaches, unauthorized data manipulation, or disruption of RSS feed services. Organizations relying on FreshRSS for internal communications or information aggregation may face confidentiality breaches and operational disruptions. The fact that OIDC setups are not affected by privilege escalation reduces risk for organizations using modern authentication methods, but many European entities may still use HTTP auth via reverse proxies, especially in legacy or smaller deployments. The absence of known exploits in the wild suggests a window of opportunity for proactive patching before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately upgrade all FreshRSS instances to version 1.26.2 or later to apply the official patch addressing CVE-2025-46341. For those unable to upgrade promptly, it is critical to review and restrict access to the FreshRSS instance, ensuring that only trusted IP addresses can reach the service, thereby reducing the attack surface. Additionally, organizations should consider migrating authentication mechanisms from HTTP auth via reverse proxy to more secure methods such as OpenID Connect (OIDC), which mitigates the privilege escalation vector. Implement strict validation and sanitization of HTTP headers like 'Remote-User' and 'X-WebAuth-User' at the proxy or application level to prevent header spoofing. Monitoring and logging of unusual access patterns or header manipulations should be enhanced to detect potential exploitation attempts. Network segmentation should be enforced to limit the ability of an attacker to reach internal services via SSRF. Finally, conduct security awareness and training for administrators to recognize and respond to SSRF-related threats and ensure that CSRF tokens and other security tokens are handled securely to prevent scraping or leakage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-46341: CWE-918: Server-Side Request Forgery (SSRF) in FreshRSS FreshRSS
Description
FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, when the server is using HTTP auth via reverse proxy, it's possible to impersonate any user either via the `Remote-User` header or the `X-WebAuth-User` header by making specially crafted requests via the add feed functionality and obtaining the CSRF token via XPath scraping. The attacker has to know the IP address of the proxied FreshRSS instance and the admin's username, while also having an account on the instance. An attacker can send specially crafted requests in order to gain unauthorized access to internal services. This can also lead to privilege escalation like in the demonstrated scenario, although users that have setup OIDC are not affected by privilege escalation. Version 1.26.2 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-46341 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting FreshRSS, a popular self-hosted RSS feed aggregator, in versions prior to 1.26.2. The vulnerability arises when FreshRSS is deployed behind a reverse proxy that uses HTTP authentication. An attacker who knows the IP address of the proxied FreshRSS instance, the administrator's username, and who also has a valid user account on the instance, can exploit this flaw. By crafting malicious requests through the 'add feed' functionality and extracting the CSRF token via XPath scraping, the attacker can impersonate any user by manipulating the 'Remote-User' or 'X-WebAuth-User' HTTP headers. This impersonation enables unauthorized access to internal services and can lead to privilege escalation, allowing the attacker to gain higher privileges than their original account. Notably, setups using OpenID Connect (OIDC) for authentication are not vulnerable to the privilege escalation aspect of this issue. The vulnerability is tracked under CWE-918 (SSRF), which involves an attacker inducing the server to make HTTP requests to arbitrary locations, potentially bypassing network access controls. The vulnerability has a CVSS v3.1 score of 7.1, indicating a high severity level, with the attack vector being network-based, requiring low privileges and no user interaction, and impacting confidentiality significantly. The vulnerability was publicly disclosed on June 4, 2025, and patched in FreshRSS version 1.26.2. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using FreshRSS instances, especially those self-hosted behind reverse proxies with HTTP authentication, this vulnerability poses a significant risk. Exploitation can lead to unauthorized access to internal services, potentially exposing sensitive information or internal network resources. The privilege escalation capability means that attackers with limited user accounts can elevate their privileges, compromising the integrity of the system and potentially gaining administrative control. This could lead to data breaches, unauthorized data manipulation, or disruption of RSS feed services. Organizations relying on FreshRSS for internal communications or information aggregation may face confidentiality breaches and operational disruptions. The fact that OIDC setups are not affected by privilege escalation reduces risk for organizations using modern authentication methods, but many European entities may still use HTTP auth via reverse proxies, especially in legacy or smaller deployments. The absence of known exploits in the wild suggests a window of opportunity for proactive patching before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately upgrade all FreshRSS instances to version 1.26.2 or later to apply the official patch addressing CVE-2025-46341. For those unable to upgrade promptly, it is critical to review and restrict access to the FreshRSS instance, ensuring that only trusted IP addresses can reach the service, thereby reducing the attack surface. Additionally, organizations should consider migrating authentication mechanisms from HTTP auth via reverse proxy to more secure methods such as OpenID Connect (OIDC), which mitigates the privilege escalation vector. Implement strict validation and sanitization of HTTP headers like 'Remote-User' and 'X-WebAuth-User' at the proxy or application level to prevent header spoofing. Monitoring and logging of unusual access patterns or header manipulations should be enhanced to detect potential exploitation attempts. Network segmentation should be enforced to limit the ability of an attacker to reach internal services via SSRF. Finally, conduct security awareness and training for administrators to recognize and respond to SSRF-related threats and ensure that CSRF tokens and other security tokens are handled securely to prevent scraping or leakage.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-22T22:41:54.912Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6840ac7f182aa0cae2bd73a5
Added to database: 6/4/2025, 8:28:47 PM
Last enriched: 7/6/2025, 9:28:18 PM
Last updated: 1/7/2026, 8:48:30 AM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.