Unrated severityNVD Advisory· Published Dec 9, 2022· Updated Apr 23, 2025
Insecure file access in FreshRSS
CVE-2022-23497
Description
FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file ./FreshRSS/p/ext.php.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/FreshRSS/FreshRSS/pull/4928mitrex_refsource_MISC
- github.com/FreshRSS/FreshRSS/releases/tag/1.20.2mitrex_refsource_MISC
- github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.