FreshRSS is a free, self-hostable RSS aggregator. From version 1.27.0 to before 1.28.0, An attacker could globally deny access to feeds via proxy modifying to 429 Retry-After for a large list of feeds on given instance, making it unusable for majority of users. This issue has been patched in version 1.28.0.
References
| Link | Resource |
|---|---|
| https://github.com/FreshRSS/FreshRSS/commit/7d4854a0a4f5665db599f18c34035786465639f3 | Patch |
| https://github.com/FreshRSS/FreshRSS/pull/8029 | Issue Tracking |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-qw34-frg7-gf78 | Exploit Patch Vendor Advisory |
| https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-qw34-frg7-gf78 | Exploit Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-27 00:15
Updated : 2025-12-31 21:16
NVD link : CVE-2025-68148
Mitre link : CVE-2025-68148
CVE.ORG link : CVE-2025-68148
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
