← Back to CVEs
CVE-2025-68932
CRITICAL9.8
Description
FreshRSS is a free, self-hostable RSS aggregator. Prior to version 1.28.0, FreshRSS uses cryptographically weak random number generators (mt_rand() and uniqid()) to generate remember-me authentication tokens and challenge-response nonces. This allows attackers to predict valid session tokens, leading to account takeover through persistent session hijacking. The remember-me tokens provide permanent authentication and are the sole credential for "keep me logged in" functionality. This issue has been patched in version 1.28.0.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/27/2025
Last Modified12/31/2025
Sourcenvd
Honeypot Sightings0
Affected Products
freshrss:freshrss
Weaknesses (CWE)
CWE-338
References
https://github.com/FreshRSS/FreshRSS/commit/57e1a375cbd2db9741ff19167813344f8eff5772(security-advisories@github.com)
https://github.com/FreshRSS/FreshRSS/pull/8061(security-advisories@github.com)
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j9wc-gwc6-p786(security-advisories@github.com)
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j9wc-gwc6-p786(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.