FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* |
Tue, 30 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freshrss
Freshrss freshrss |
|
| Vendors & Products |
Freshrss
Freshrss freshrss |
Mon, 29 Sep 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0. | |
| Title | FreshRSS: Double clickjacking can lead to privilege escalation | |
| Weaknesses | CWE-1021 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-29T23:21:42.118Z
Updated: 2025-09-30T14:19:51.364Z
Reserved: 2025-09-23T14:33:49.506Z
Link: CVE-2025-59950
Updated: 2025-09-30T14:19:48.673Z
Status : Analyzed
Published: 2025-09-30T04:43:45.933
Modified: 2025-10-03T15:52:28.380
Link: CVE-2025-59950
No data.