{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-61586","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-09-26T16:25:25.150Z","datePublished":"2025-09-29T23:14:51.054Z","dateUpdated":"2025-09-30T14:31:02.217Z"},"containers":{"cna":{"title":"FreshRSS is vulnerable to directory enumeration by setting path in its theme field","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":6.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f","tags":["x_refsource_CONFIRM"],"url":"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f"},{"name":"https://github.com/FreshRSS/FreshRSS/pull/7722","tags":["x_refsource_MISC"],"url":"https://github.com/FreshRSS/FreshRSS/pull/7722"},{"name":"https://github.com/FreshRSS/FreshRSS/commit/6549932d59aef3b72a9da29294af0f30ffb77af5","tags":["x_refsource_MISC"],"url":"https://github.com/FreshRSS/FreshRSS/commit/6549932d59aef3b72a9da29294af0f30ffb77af5"}],"affected":[{"vendor":"FreshRSS","product":"FreshRSS","versions":[{"version":"< 1.27.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-09-29T23:14:51.054Z"},"descriptions":[{"lang":"en","value":"FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below are vulnerable to directory enumeration by setting path in theme field, allowing attackers to gain additional information about the server by checking if certain directories exist. This issue is fixed in version 1.27.0."}],"source":{"advisory":"GHSA-w35p-p867-qr4f","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w35p-p867-qr4f","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-30T14:30:45.955854Z","id":"CVE-2025-61586","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-30T14:31:02.217Z"}}]}}