Browse all 22 CVE security advisories affecting FreshRSS. AI-powered Chinese analysis, POCs, and references for each vulnerability.
FreshRSS is an open-source, self-hosted RSS aggregator designed to allow users to monitor multiple news feeds from a single interface. As a PHP-based web application, it has historically been associated with twenty-two recorded Common Vulnerabilities and Exposures (CVEs). The most prevalent vulnerability classes include SQL injection, cross-site scripting (XSS), and remote code execution (RCE), often stemming from insufficient input validation and improper handling of user-supplied data. While the project maintains an active development cycle to address these issues, the frequency of past exploits highlights the risks inherent in complex web interfaces. Notable incidents have primarily involved authenticated attacks or specific configuration weaknesses rather than widespread, unauthenticated breaches. Users are advised to keep installations updated and restrict access to trusted networks to mitigate potential exposure to these known security flaws.
This page lists every published CVE security advisory associated with FreshRSS. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.