Vulnerability Details CVE-2025-59950
FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.3 and below, due to a bypass of double clickjacking protection (confirmation dialog), it is possible to trick the admin into clicking the Promote button in another user's management page after the admin double clicks on a button inside an attacker-controlled website. A successful attack can allow the attacker to promote themselves to "admin" and log into other users' accounts; the attacker has to know the specific instance URL they're targeting. This issue is fixed in version 1.27.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 6.8%
CVSS Severity
CVSS v3 Score 6.7
Products affected by CVE-2025-59950
-
cpe:2.3:a:freshrss:freshrss:0.1.0
-
cpe:2.3:a:freshrss:freshrss:0.2.0
-
cpe:2.3:a:freshrss:freshrss:0.3.0
-
cpe:2.3:a:freshrss:freshrss:0.4.0
-
cpe:2.3:a:freshrss:freshrss:0.5.0
-
cpe:2.3:a:freshrss:freshrss:0.6.0
-
cpe:2.3:a:freshrss:freshrss:0.6.1
-
cpe:2.3:a:freshrss:freshrss:0.7.0
-
cpe:2.3:a:freshrss:freshrss:0.7.1
-
cpe:2.3:a:freshrss:freshrss:0.7.2
-
cpe:2.3:a:freshrss:freshrss:0.7.3
-
cpe:2.3:a:freshrss:freshrss:0.7.4
-
cpe:2.3:a:freshrss:freshrss:0.8.0
-
cpe:2.3:a:freshrss:freshrss:0.8.1
-
cpe:2.3:a:freshrss:freshrss:0.9.0
-
cpe:2.3:a:freshrss:freshrss:0.9.1
-
cpe:2.3:a:freshrss:freshrss:0.9.2
-
cpe:2.3:a:freshrss:freshrss:0.9.3
-
cpe:2.3:a:freshrss:freshrss:0.9.4
-
cpe:2.3:a:freshrss:freshrss:1.0.0
-
cpe:2.3:a:freshrss:freshrss:1.1.0
-
cpe:2.3:a:freshrss:freshrss:1.1.1
-
cpe:2.3:a:freshrss:freshrss:1.1.2
-
cpe:2.3:a:freshrss:freshrss:1.1.3
-
cpe:2.3:a:freshrss:freshrss:1.10.0
-
cpe:2.3:a:freshrss:freshrss:1.10.1
-
cpe:2.3:a:freshrss:freshrss:1.10.2
-
cpe:2.3:a:freshrss:freshrss:1.11.0
-
cpe:2.3:a:freshrss:freshrss:1.11.1
-
cpe:2.3:a:freshrss:freshrss:1.11.2
-
cpe:2.3:a:freshrss:freshrss:1.12.0
-
cpe:2.3:a:freshrss:freshrss:1.13.0
-
cpe:2.3:a:freshrss:freshrss:1.13.1
-
cpe:2.3:a:freshrss:freshrss:1.14.0
-
cpe:2.3:a:freshrss:freshrss:1.14.1
-
cpe:2.3:a:freshrss:freshrss:1.14.2
-
cpe:2.3:a:freshrss:freshrss:1.14.3
-
cpe:2.3:a:freshrss:freshrss:1.15.0
-
cpe:2.3:a:freshrss:freshrss:1.15.1
-
cpe:2.3:a:freshrss:freshrss:1.15.2
-
cpe:2.3:a:freshrss:freshrss:1.15.3
-
cpe:2.3:a:freshrss:freshrss:1.16.0
-
cpe:2.3:a:freshrss:freshrss:1.16.1
-
cpe:2.3:a:freshrss:freshrss:1.16.2
-
cpe:2.3:a:freshrss:freshrss:1.17.0
-
cpe:2.3:a:freshrss:freshrss:1.18.0
-
cpe:2.3:a:freshrss:freshrss:1.18.1
-
cpe:2.3:a:freshrss:freshrss:1.19.0
-
cpe:2.3:a:freshrss:freshrss:1.19.1
-
cpe:2.3:a:freshrss:freshrss:1.19.2
-
cpe:2.3:a:freshrss:freshrss:1.2.0
-
cpe:2.3:a:freshrss:freshrss:1.20.0
-
cpe:2.3:a:freshrss:freshrss:1.20.1
-
cpe:2.3:a:freshrss:freshrss:1.20.2
-
cpe:2.3:a:freshrss:freshrss:1.21.0
-
cpe:2.3:a:freshrss:freshrss:1.22.0
-
cpe:2.3:a:freshrss:freshrss:1.22.1
-
cpe:2.3:a:freshrss:freshrss:1.23.0
-
cpe:2.3:a:freshrss:freshrss:1.23.1
-
cpe:2.3:a:freshrss:freshrss:1.24.0
-
cpe:2.3:a:freshrss:freshrss:1.24.1
-
cpe:2.3:a:freshrss:freshrss:1.24.2
-
cpe:2.3:a:freshrss:freshrss:1.24.3
-
cpe:2.3:a:freshrss:freshrss:1.25.0
-
cpe:2.3:a:freshrss:freshrss:1.26.0
-
cpe:2.3:a:freshrss:freshrss:1.26.1
-
cpe:2.3:a:freshrss:freshrss:1.26.2
-
cpe:2.3:a:freshrss:freshrss:1.26.3
-
cpe:2.3:a:freshrss:freshrss:1.3.0
-
cpe:2.3:a:freshrss:freshrss:1.3.1
-
cpe:2.3:a:freshrss:freshrss:1.3.2
-
cpe:2.3:a:freshrss:freshrss:1.4.0
-
cpe:2.3:a:freshrss:freshrss:1.5.0
-
cpe:2.3:a:freshrss:freshrss:1.6.0
-
cpe:2.3:a:freshrss:freshrss:1.6.1
-
cpe:2.3:a:freshrss:freshrss:1.6.2
-
cpe:2.3:a:freshrss:freshrss:1.6.3
-
cpe:2.3:a:freshrss:freshrss:1.7.0
-
cpe:2.3:a:freshrss:freshrss:1.8.0
-
cpe:2.3:a:freshrss:freshrss:1.9.0