CVE-2025-31136
NixOS vulnerability analysis and mitigation

Overview

FreshRSS, a self-hosted RSS feed aggregator, was found to contain a critical vulnerability (CVE-2025-31136) prior to version 1.26.2. The vulnerability allows attackers to execute arbitrary JavaScript code on the feeds page through a combination of a cross-site scripting (XSS) issue in f.php when handling SVG favicons and the absence of proper Content Security Policy (CSP) (GitHub Advisory).

Technical details

The vulnerability stems from two main issues: an XSS vulnerability in f.php when processing SVG favicons containing unsanitized <script> tags downloaded from attacker-controlled feeds, and the lack of CSP in f.php. The exploit involves embedding a malicious favicon in an iframe with the attribute sandbox="allow-scripts allow-same-origin". The vulnerability received a CVSS v3.1 score of 6.7 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L (GitHub Advisory).

Impact

The vulnerability enables attackers to gain unauthorized access to victim accounts. If the compromised account has administrative privileges, the attacker could potentially delete all users or execute arbitrary code on the server by modifying the update URL using fetch() via the XSS (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in FreshRSS version 1.26.2. The fix includes implementing proper Content Security Policy headers for favicons (GitHub Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management