FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below do not properly terminate the session during logout. After a user logs out, the session cookie remains active and unchanged. The unchanged cookie could be reused by an attacker if a new session were to be started. This failure to invalidate the session can lead to session hijacking and fixation vulnerabilities. This issue is fixed in version 1.27.0
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 29 Sep 2025 21:30:00 +0000

Type Values Removed Values Added
Description FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below do not properly terminate the session during logout. After a user logs out, the session cookie remains active and unchanged. The unchanged cookie could be reused by an attacker if a new session were to be started. This failure to invalidate the session can lead to session hijacking and fixation vulnerabilities. This issue is fixed in version 1.27.0
Title FreshRSS has Incomplete Session Termination on Logout
Weaknesses CWE-613
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-29T21:23:43.903Z

Reserved: 2025-07-25T16:19:16.095Z

Link: CVE-2025-54592

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-29T22:15:36.160

Modified: 2025-09-29T22:15:36.160

Link: CVE-2025-54592

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.