FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0.
References
Link | Resource |
---|---|
https://github.com/FreshRSS/FreshRSS/pull/7771 | Patch |
https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0 | Release Notes |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j66v-hvqx-5vh3 | Exploit Vendor Advisory |
https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j66v-hvqx-5vh3 | Exploit Vendor Advisory |
Configurations
History
03 Oct 2025, 15:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* | |
First Time |
Freshrss freshrss
Freshrss |
|
References | () https://github.com/FreshRSS/FreshRSS/pull/7771 - Patch | |
References | () https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0 - Release Notes | |
References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j66v-hvqx-5vh3 - Exploit, Vendor Advisory |
30 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j66v-hvqx-5vh3 - |
30 Sep 2025, 04:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-30 04:43
Updated : 2025-10-03 15:52
NVD link : CVE-2025-59950
Mitre link : CVE-2025-59950
CVE.ORG link : CVE-2025-59950
JSON object : View
Products Affected
freshrss
- freshrss
CWE
CWE-1021
Improper Restriction of Rendered UI Layers or Frames