Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 31 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freshrss
Freshrss freshrss |
|
| Vendors & Products |
Freshrss
Freshrss freshrss |
Mon, 29 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 27 Dec 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FreshRSS is a free, self-hostable RSS aggregator. Prior to version 1.28.0, FreshRSS uses cryptographically weak random number generators (mt_rand() and uniqid()) to generate remember-me authentication tokens and challenge-response nonces. This allows attackers to predict valid session tokens, leading to account takeover through persistent session hijacking. The remember-me tokens provide permanent authentication and are the sole credential for "keep me logged in" functionality. This issue has been patched in version 1.28.0. | |
| Title | FreshRSS has weak cryptographic randomness in remember-me token and nonce generation | |
| Weaknesses | CWE-338 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-29T16:51:53.481Z
Reserved: 2025-12-24T23:59:23.392Z
Link: CVE-2025-68932
Updated: 2025-12-29T16:44:36.132Z
Status : Analyzed
Published: 2025-12-27T00:15:42.633
Modified: 2025-12-31T21:12:56.473
Link: CVE-2025-68932
No data.
OpenCVE Enrichment
Updated: 2025-12-29T22:33:30Z