{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T19:56:20.922","vulnerabilities":[{"cve":{"id":"CVE-2022-23497","sourceIdentifier":"security-advisories@github.com","published":"2022-12-09T23:15:11.680","lastModified":"2024-11-21T06:48:41.210","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file `./FreshRSS/p/ext.php`."},{"lang":"es","value":"FreshRSS es un agregador de RSS gratuito y autohospedable. Un usuario remoto puede acceder a los archivos de configuración del usuario. Además de las preferencias del usuario, dichas configuraciones contienen contraseñas hash (brypt con costo 9, saladas) de la interfaz web FreshRSS. Si se utiliza la API, la configuración puede contener una contraseña hash (brypt con costo 9, salada) de la API GReader y una contraseña hash (MD5 salada) de la API Fever. Los usuarios deben actualizar a la versión 1.20.2 o edge. Los usuarios que no puedan actualizar pueden aplicar el parche manualmente o eliminar el archivo `./FreshRSS/p/ext.php`."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*","versionStartIncluding":"1.18.0","versionEndExcluding":"1.20.2","matchCriteriaId":"EE2D8147-E1C5-47A5-A70A-FDB48A4F291A"}]}]}],"references":[{"url":"https://github.com/FreshRSS/FreshRSS/pull/4928","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/FreshRSS/FreshRSS/pull/4928","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/FreshRSS/FreshRSS/releases/tag/1.20.2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-hvrj-5fwj-p7v6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}