


Perceptive Security
SOC/SIEM Consultancy

FreshRSS is a free, self-hostable RSS aggregator. Prior 1.28.0, a bug in the auth logic related to master authentication tokens, this restriction is bypassed. U…
Published:
8 maart 2026 om 23:00:00
Alert date:
9 maart 2026 om 21:02:12
Source:
nvd.nist.gov
Web Technologies, Identity & Access
FreshRSS, a free self-hostable RSS aggregator, contains an authentication bypass vulnerability in versions prior to 1.28.0. The bug exists in the auth logic related to master authentication tokens, allowing the restriction to be bypassed. This vulnerability enables unauthorized access to private user feeds when anonymous viewing is enabled, when normally only the default user's feed should be viewable. The issue has been patched in version 1.28.0.
Technical details
Mitigation steps:
Affected products:
FreshRSS
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-62166
https://github.com/FreshRSS/FreshRSS/commit/60cf5ea297a17db861e73cd65d7b7862bd6bcc24
https://github.com/FreshRSS/FreshRSS/pull/8165
https://github.com/FreshRSS/FreshRSS/releases/tag/1.28.0
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w743-fg6g-mhwh
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
