FKIE_CVE-2026-23962
Vulnerability from fkie_nvd - Published: 2026-01-22 03:15 - Updated: 2026-02-02 20:27
Severity ?
Summary
Mastodon is a free, open-source social network server based on ActivityPub. Mastodon versions before v4.3.18, v4.4.12, and v4.5.5 do not have a limit on the maximum number of poll options for remote posts, allowing attackers to create polls with a very large amount of options, greatly increasing resource consumption. Depending on the number of poll options, an attacker can cause disproportionate resource usage in both Mastodon servers and clients, potentially causing Denial of Service either server-side or client-side. Mastodon versions v4.5.5, v4.4.12, v4.3.18 are patched.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| joinmastodon | mastodon | * | |
| joinmastodon | mastodon | * | |
| joinmastodon | mastodon | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADDA491-E534-4DFB-856F-9D07F38F3A92",
"versionEndExcluding": "4.3.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BAA2A25-EE70-4B9F-8848-2CCE9C243077",
"versionEndExcluding": "4.4.12",
"versionStartIncluding": "4.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71845808-53CF-46D1-9A12-F14F1BAED488",
"versionEndExcluding": "4.5.5",
"versionStartIncluding": "4.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mastodon is a free, open-source social network server based on ActivityPub. Mastodon versions before v4.3.18, v4.4.12, and v4.5.5 do not have a limit on the maximum number of poll options for remote posts, allowing attackers to create polls with a very large amount of options, greatly increasing resource consumption. Depending on the number of poll options, an attacker can cause disproportionate resource usage in both Mastodon servers and clients, potentially causing Denial of Service either server-side or client-side. Mastodon versions v4.5.5, v4.4.12, v4.3.18 are patched."
},
{
"lang": "es",
"value": "Mastodon es un servidor de red social gratuito y de c\u00f3digo abierto basado en ActivityPub. Las versiones de Mastodon anteriores a la v4.3.18, v4.4.12 y v4.5.5 no tienen un l\u00edmite en el n\u00famero m\u00e1ximo de opciones de encuesta para publicaciones remotas, lo que permite a los atacantes crear encuestas con una cantidad muy grande de opciones, aumentando considerablemente el consumo de recursos. Dependiendo del n\u00famero de opciones de encuesta, un atacante puede causar un uso desproporcionado de recursos tanto en los servidores como en los clientes de Mastodon, lo que podr\u00eda causar una denegaci\u00f3n de servicio ya sea del lado del servidor o del lado del cliente. Las versiones de Mastodon v4.5.5, v4.4.12, v4.3.18 est\u00e1n parcheadas."
}
],
"id": "CVE-2026-23962",
"lastModified": "2026-02-02T20:27:51.360",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-01-22T03:15:46.400",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/mastodon/mastodon/releases/tag/v4.3.18"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/mastodon/mastodon/releases/tag/v4.4.12"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/mastodon/mastodon/releases/tag/v4.5.5"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/mastodon/mastodon/security/advisories/GHSA-gg8q-rcg7-p79g"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…