Unrated severityNVD Advisory· Published Sep 29, 2025· Updated Sep 30, 2025
FreshRSS: Double clickjacking can lead to privilege escalation
CVE-2025-59950
Description
FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/FreshRSS/FreshRSS/pull/7771mitrex_refsource_MISC
- github.com/FreshRSS/FreshRSS/releases/tag/1.27.0mitrex_refsource_MISC
- github.com/FreshRSS/FreshRSS/security/advisories/GHSA-j66v-hvqx-5vh3mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.