CVE-2025-57769
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-29

Last updated on: 2025-10-03

Assigner: GitHub, Inc.

Description
FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below contain a vulnerability where a specially crafted page can trick a user into executing arbitrary JS code or promoting a user in FreshRSS by obscuring UI elements in iframes. If embedding an authenticated iframe is possible, this may lead to privilege escalation via obscuring the promote user button in the admin UI or XSS by tricking the user to drag content into the UserJS text area. This is fixed in version 1.27.0
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-29
Last Modified
2025-10-03
Generated
2026-05-06
AI Q&A
2025-09-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
freshrss freshrss to 1.27.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1021 The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in FreshRSS versions 1.26.3 and below allows an attacker to trick a user into executing arbitrary JavaScript code or promote a user by hiding UI elements within iframes. If an authenticated iframe can be embedded, it may lead to privilege escalation by obscuring the promote user button in the admin interface or cause cross-site scripting (XSS) by tricking the user into dragging content into the UserJS text area. The issue is fixed in version 1.27.0.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute arbitrary JavaScript code in your FreshRSS instance, potentially leading to unauthorized actions such as promoting users to higher privilege levels (privilege escalation). This can compromise the security and integrity of your RSS aggregator, allowing attackers to gain administrative control or manipulate data.


What immediate steps should I take to mitigate this vulnerability?

Upgrade FreshRSS to version 1.27.0 or later, as this version contains the fix for the vulnerability. Avoid embedding authenticated iframes from untrusted sources and be cautious of user interactions that could trigger the exploit, such as dragging content into the UserJS text area.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart