CVE-2025-59948
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-29

Last updated on: 2025-10-03

Assigner: GitHub, Inc.

Description
FreshRSS is a free, self-hostable RSS aggregator. Versions 1.26.3 and below do not sanitize certain event handler attributes in feed content, so by finding a page that renders feed entries without CSP, it is possible to execute an XSS payload. The Allow API access authentication setting needs to be enabled by the instance administrator beforehand for the attack to work as it relies on api/query.php. An account takeover is possible by sending a change password request via the XSS payload / setting UserJS for persistence / stealing the autofill password / displaying a phishing page with a spoofed URL using history.replaceState() If the victim is an administrator, the attacker can also perform administrative actions. This issue is fixed in version 1.27.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-29
Last Modified
2025-10-03
Generated
2026-05-07
AI Q&A
2025-09-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
freshrss freshrss to 1.27.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in FreshRSS (versions 1.26.3 and below) allows an attacker to execute a cross-site scripting (XSS) payload by exploiting unsanitized event handler attributes in feed content. The attack requires the 'Allow API access authentication' setting to be enabled and targets the api/query.php endpoint. Through this XSS, an attacker can take over user accounts by changing passwords, persisting malicious scripts, stealing autofill passwords, or displaying phishing pages with spoofed URLs. If the victim is an administrator, the attacker can also perform administrative actions. The issue is fixed in version 1.27.0.


How can this vulnerability impact me? :

This vulnerability can lead to account takeover, including administrative accounts, allowing attackers to perform unauthorized actions within the FreshRSS instance. It can result in theft of sensitive information such as passwords, persistent malicious scripts running in users' browsers, and phishing attacks via spoofed URLs. Overall, it compromises the security and integrity of the FreshRSS service and its users.


What immediate steps should I take to mitigate this vulnerability?

Upgrade FreshRSS to version 1.27.0 or later, as this version fixes the vulnerability. Additionally, consider disabling the 'Allow API access authentication' setting if it is not required, to reduce the attack surface.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart