CVE-2023-27591Sensitive Information Exposure in V2

Severity
7.5HIGHNVD
EPSS
0.5%
top 34.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 17
Latest updateApr 2

Description

Miniflux is a feed reader. Prior to version 2.0.43, an unauthenticated user can retrieve Prometheus metrics from a publicly reachable Miniflux instance where the `METRICS_COLLECTOR` configuration option is enabled and `METRICS_ALLOWED_NETWORKS` is set to `127.0.0.1/8` (the default). A patch is available in Miniflux 2.0.43. As a workaround, set `METRICS_COLLECTOR` to `false` (default) or run Miniflux behind a trusted reverse-proxy.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5miniflux/v2< 2.0.43
Gominiflux.app/v2< 2.0.43

Patches

🔴Vulnerability Details

2
GHSA
Unauthenticated Miniflux user can bypass allowed networks check to obtain Prometheus metrics2025-04-02
OSV
Unauthenticated Miniflux user can bypass allowed networks check to obtain Prometheus metrics2025-04-02