FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below contain a vulnerability where a specially crafted page can trick a user into executing arbitrary JS code or promoting a user in FreshRSS by obscuring UI elements in iframes. If embedding an authenticated iframe is possible, this may lead to privilege escalation via obscuring the promote user button in the admin UI or XSS by tricking the user to drag content into the UserJS text area. This is fixed in version 1.27.0
References
Link | Resource |
---|---|
https://github.com/FreshRSS/FreshRSS/pull/7677 | Patch |
https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0 | Release Notes |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-wm5p-7pr7-c8rw | Exploit Vendor Advisory |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-wm5p-7pr7-c8rw | Exploit Vendor Advisory |
Configurations
History
03 Oct 2025, 15:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* | |
First Time |
Freshrss freshrss
Freshrss |
|
References | () https://github.com/FreshRSS/FreshRSS/pull/7677 - Patch | |
References | () https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0 - Release Notes | |
References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-wm5p-7pr7-c8rw - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
30 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-wm5p-7pr7-c8rw - |
29 Sep 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-29 22:15
Updated : 2025-10-03 15:58
NVD link : CVE-2025-57769
Mitre link : CVE-2025-57769
CVE.ORG link : CVE-2025-57769
JSON object : View
Products Affected
freshrss
- freshrss