FreshRSS is a free, self-hostable RSS aggregator. Prior to version 1.28.0, FreshRSS uses cryptographically weak random number generators (mt_rand() and uniqid()) to generate remember-me authentication tokens and challenge-response nonces. This allows attackers to predict valid session tokens, leading to account takeover through persistent session hijacking. The remember-me tokens provide permanent authentication and are the sole credential for "keep me logged in" functionality. This issue has been patched in version 1.28.0.
Metrics
Affected Vendors & Products
References
History
Sat, 27 Dec 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FreshRSS is a free, self-hostable RSS aggregator. Prior to version 1.28.0, FreshRSS uses cryptographically weak random number generators (mt_rand() and uniqid()) to generate remember-me authentication tokens and challenge-response nonces. This allows attackers to predict valid session tokens, leading to account takeover through persistent session hijacking. The remember-me tokens provide permanent authentication and are the sole credential for "keep me logged in" functionality. This issue has been patched in version 1.28.0. | |
| Title | FreshRSS has weak cryptographic randomness in remember-me token and nonce generation | |
| Weaknesses | CWE-338 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-26T23:43:34.693Z
Reserved: 2025-12-24T23:59:23.392Z
Link: CVE-2025-68932
No data.
Status : Received
Published: 2025-12-27T00:15:42.633
Modified: 2025-12-27T00:15:42.633
Link: CVE-2025-68932
No data.
OpenCVE Enrichment
No data.