Description

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue.

INFO

Published Date :

2025-06-04T20:04:54.504Z

Last Modified :

2025-06-04T20:48:49.550Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-46339 vulnerability.

Vendors Products
Freshrss
  • Freshrss
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-46339.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact