We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-31134

FreshRSS vulnerable to directory enumeration via ext.php



Description

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, an attacker can gain additional information about the server by checking if certain directories exist. An attacker can, for example, check if older PHP versions are installed or if certain software is installed on the server and potentially use that information to further attack the server. Version 1.26.2 contains a patch for the issue.

Reserved 2025-03-26 | Published 2025-06-04 | Updated 2025-06-04 | Assigner GitHub_M


MEDIUM: 5.5CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

< 1.26.2
affected

References

github.com/...eshRSS/security/advisories/GHSA-jjm2-4hf7-9x65

github.com/...ommit/4568111c00813756a3a34a381d684b8354fc4438

cve.org (CVE-2025-31134)

nvd.nist.gov (CVE-2025-31134)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-31134

Support options

Helpdesk Chat, Email, Knowledgebase