Impact
Mastodon allows administrators to suspend remote users so that their content normally disappears from timelines. A logic error in the enforcement of suspension status lets previously known posts reappear when boosted, and in specific release ranges also lets new posts from the suspended user be displayed to all users. This missing‑authorization flaw, identified as CWE‑863, undermines the administrative suspension, potentially exposing sensitive content or misleading audiences.
Affected Systems
All Mastodon instances are vulnerable. Unpatched versions include the full distribution as well as the ranges v4.5.0 through v4.5.4, v4.4.5 through v4.4.11, v4.3.13 through v4.3.17, and v4.2.26 through v4.2.29. Versions v4.5.5, v4.4.12, and v4.3.18 contain the vendor‑issued fix and are not affected.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, while the EPSS probability is below 1% and the vulnerability is not included in CISA’s KEV catalog, suggesting a low but non‑zero exploitation risk. Attackers could exploit the flaw remotely via normal user actions such as boosting a suspended user’s post or interacting with the public timeline API, with no elevated privileges required.
OpenCVE Enrichment