CVE-2025-68932

FreshRSS is a free, self-hostable RSS aggregator. Prior to version 1.28.0, FreshRSS uses cryptographically weak random number generators (mt_rand() and uniqid()) to generate remember-me authentication tokens and challenge-response nonces. This allows attackers to predict valid session tokens, leading to account takeover through persistent session hijacking. The remember-me tokens provide permanent authentication and are the sole credential for "keep me logged in" functionality. This issue has been patched in version 1.28.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*

History

31 Dec 2025, 21:12

Type Values Removed Values Added
CPE cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*
First Time Freshrss
Freshrss freshrss
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/FreshRSS/FreshRSS/commit/57e1a375cbd2db9741ff19167813344f8eff5772 - () https://github.com/FreshRSS/FreshRSS/commit/57e1a375cbd2db9741ff19167813344f8eff5772 - Patch
References () https://github.com/FreshRSS/FreshRSS/pull/8061 - () https://github.com/FreshRSS/FreshRSS/pull/8061 - Issue Tracking, Patch
References () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j9wc-gwc6-p786 - () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j9wc-gwc6-p786 - Exploit, Patch, Vendor Advisory

29 Dec 2025, 17:15

Type Values Removed Values Added
References () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j9wc-gwc6-p786 - () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j9wc-gwc6-p786 -

27 Dec 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-27 00:15

Updated : 2025-12-31 21:12


NVD link : CVE-2025-68932

Mitre link : CVE-2025-68932

CVE.ORG link : CVE-2025-68932


JSON object : View

Products Affected

freshrss

  • freshrss
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)