CVE-2025-68932
Severity CVSS v4.0:
LOW
Type:
Unavailable / Other
Publication date:
27/12/2025
Last modified:
31/12/2025
Description
FreshRSS is a free, self-hostable RSS aggregator. Prior to version 1.28.0, FreshRSS uses cryptographically weak random number generators (mt_rand() and uniqid()) to generate remember-me authentication tokens and challenge-response nonces. This allows attackers to predict valid session tokens, leading to account takeover through persistent session hijacking. The remember-me tokens provide permanent authentication and are the sole credential for "keep me logged in" functionality. This issue has been patched in version 1.28.0.
Impact
Base Score 4.0
2.90
Severity 4.0
LOW
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* | 1.28.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



