Impact
The vulnerability is a GET-based open redirect in Mastodon’s /web/* route. The application fails to normalize URL-encoded slashes, enabling an attacker to craft a URL that redirects a visitor to any external domain. This can be used to host phishing pages or force users to grant OAuth permissions to a malicious site.
Affected Systems
The issue exists in all Mastodon releases earlier than 4.5.8, 4.4.15, and 4.3.21. Unauthenticated attackers can target any instance running those older versions.
Risk and Exploitability
The CVSS base score of 4.3 reflects moderate severity, and the EPSS score below 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Attack requires only a simple HTTP GET request and no credentials, so it can be triggered by anyone with internet access.
OpenCVE Enrichment