Description
FreshRSS is a free, self-hostable RSS aggregator. Prior to version 1.28.0, FreshRSS uses cryptographically weak random number generators (mt_rand() and uniqid()) to generate remember-me authentication tokens and challenge-response nonces. This allows attackers to predict valid session tokens, leading to account takeover through persistent session hijacking. The remember-me tokens provide permanent authentication and are the sole credential for "keep me logged in" functionality. This issue has been patched in version 1.28.0.
INFO
Published Date :
2025-12-26T23:43:34.693Z
Last Modified :
2025-12-29T16:51:53.481Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-68932 vulnerability.
| Vendors | Products |
|---|---|
| Freshrss |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-68932.