FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Oct 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:* |
Tue, 30 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freshrss
Freshrss freshrss |
|
Vendors & Products |
Freshrss
Freshrss freshrss |
Mon, 29 Sep 2025 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0. | |
Title | FreshRSS: Double clickjacking can lead to privilege escalation | |
Weaknesses | CWE-1021 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-29T23:21:42.118Z
Updated: 2025-09-30T14:19:51.364Z
Reserved: 2025-09-23T14:33:49.506Z
Link: CVE-2025-59950

Updated: 2025-09-30T14:19:48.673Z

Status : Analyzed
Published: 2025-09-30T04:43:45.933
Modified: 2025-10-03T15:52:28.380
Link: CVE-2025-59950

No data.