Home

Description

FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below contain a vulnerability where a specially crafted page can trick a user into executing arbitrary JS code or promoting a user in FreshRSS by obscuring UI elements in iframes. If embedding an authenticated iframe is possible, this may lead to privilege escalation via obscuring the promote user button in the admin UI or XSS by tricking the user to drag content into the UserJS text area. This is fixed in version 1.27.0

PUBLISHED Reserved 2025-08-19 | Published 2025-09-29 | Updated 2025-09-30 | Assigner GitHub_M




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-1021: Improper Restriction of Rendered UI Layers or Frames

Product status

< 1.27.0
affected

References

github.com/...eshRSS/security/advisories/GHSA-wm5p-7pr7-c8rw

github.com/FreshRSS/FreshRSS/pull/7677

github.com/FreshRSS/FreshRSS/releases/tag/1.27.0

cve.org (CVE-2025-57769)

nvd.nist.gov (CVE-2025-57769)

Download JSON