Home

Description

FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0.

PUBLISHED Reserved 2025-09-23 | Published 2025-09-29 | Updated 2025-09-30 | Assigner GitHub_M




MEDIUM: 6.7CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L

Problem types

CWE-1021: Improper Restriction of Rendered UI Layers or Frames

Product status

< 1.27.0
affected

References

github.com/...eshRSS/security/advisories/GHSA-j66v-hvqx-5vh3

github.com/FreshRSS/FreshRSS/pull/7771

github.com/FreshRSS/FreshRSS/releases/tag/1.27.0

cve.org (CVE-2025-59950)

nvd.nist.gov (CVE-2025-59950)

Download JSON