Description
Mastodon is a free, open-source social network server based on ActivityPub. In versions on the 4.5.x branch prior to 4.5.8 and on the 4.4.x branch prior to 4.4.15, an attacker that knows of a quote before it has reached a server can prevent it from being correctly processed on that server. The vulnerability has been patched in Mastodon 4.5.8 and 4.4.15. Mastodon 4.3 and earlier are not affected because they do not support quotes.
Published: 2026-03-27
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

Mastodon versions before 4.5.8 on the 4.5.x branch and before 4.4.15 on the 4.4.x branch contain a flaw that lets an attacker, who has knowledge of a pending quote, cause the server to reject or mishandle that quote. The result is that the quote cannot be posted, resulting in an interruption of service for the impacted user or the public timeline. The weakness corresponds to CWE-863, which relates to missing or improper handling of a request, and is manifested as a denial of service.

Affected Systems

Mastodon’s community servers running the 4.5.x branch older than version 4.5.8, or the 4.4.x branch older than 4.4.15, are vulnerable. Earlier releases, such as 4.3 and back, do not include quote functionality and therefore are not affected. Anyone operating a Mastodon instance that has not applied the latest patch should consider the risk of a service interruption related to quote processing.

Risk and Exploitability

The vulnerability has a CVSS score of 4.8, indicating a moderate impact. Its EPSS score is below 1%, suggesting a low probability of exploitation in the wild, and it is not listed in the CISA KEV catalog. The likely attack vector involves the attacker knowing a quote before it reaches the server, then crafting a request to deceive the server into rejecting that quote; this inference comes from the description. Because the flaw only affects quote processing and not broader system functions, the scope is limited to the affected features.

Generated by OpenCVE AI on March 30, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest patched version of Mastodon (4.5.8 or 4.4.15).
  • Verify that the instance version is no longer vulnerable.
  • If upgrading is not immediately possible, monitor for quote‑related errors and log unusual activity.

Generated by OpenCVE AI on March 30, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Joinmastodon
Joinmastodon mastodon
Vendors & Products Joinmastodon
Joinmastodon mastodon

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description Mastodon is a free, open-source social network server based on ActivityPub. In versions on the 4.5.x branch prior to 4.5.8 and on the 4.4.x branch prior to 4.4.15, an attacker that knows of a quote before it has reached a server can prevent it from being correctly processed on that server. The vulnerability has been patched in Mastodon 4.5.8 and 4.4.15. Mastodon 4.3 and earlier are not affected because they do not support quotes.
Title Mastodon has a denial of service for quote authorization
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Joinmastodon Mastodon
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T20:29:18.521Z

Reserved: 2026-03-24T15:10:05.678Z

Link: CVE-2026-33869

cve-icon Vulnrichment

Updated: 2026-03-27T20:29:14.109Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T20:16:34.500

Modified: 2026-03-30T19:12:07.253

Link: CVE-2026-33869

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:57:02Z

Weaknesses