Description
FreshRSS is a self-hosted RSS feed aggregator. In versions 1.23.0 through 1.27.0, using a path traversal inside the `language` user configuration parameter, it's possible to call `install.php` and perform various administrative actions as an unprivileged user. These actions include logging in as the admin, creating a new admin user, or set the database to an attacker-controlled MySQL server and abuse it to execute code in FreshRSS by setting malicious feed `curl_params` inside the `feed` table. Version 1.27.1 fixes the issue.
INFO
Published Date :
2025-12-15T23:07:25.225Z
Last Modified :
2025-12-16T15:09:34.878Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-58173 vulnerability.
| Vendors | Products |
|---|---|
| Freshrss |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-58173.