CVE-2025-59950

medium

Description

FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0.

References

https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j66v-hvqx-5vh3

https://github.com/FreshRSS/FreshRSS/releases/tag/1.27.0

https://github.com/FreshRSS/FreshRSS/pull/7771

Details

Source: Mitre, NVD

Published: 2025-09-30

Updated: 2025-09-30

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:P

Severity: Medium

CVSS v3

Base Score: 6.7

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L

Severity: Medium

EPSS

EPSS: 0.00033