Mastodon is a free, open-source social network server based on ActivityPub. In Mastodon before 4.4.6, 4.3.14, and 4.2.27, when an administrator resets a user account's password via the command-line interface using `bin/tootctl accounts modify --reset-password`, active sessions and access tokens for that account are not revoked. This allows an attacker with access to a previously compromised session or token to continue using the account after the password has been reset. This issue has been patched in versions 4.2.27, 4.3.14, and 4.4.6. No known workarounds exist.
References
Configurations
Configuration 1 (hide)
|
History
20 Oct 2025, 17:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:* | |
| First Time |
Joinmastodon
Joinmastodon mastodon |
|
| References | () https://github.com/mastodon/mastodon/commit/1631fb80e8029d2c5425a03a2297b93f7e225217 - Patch | |
| References | () https://github.com/mastodon/mastodon/security/advisories/GHSA-f3q3-rmf7-9655 - Vendor Advisory |
13 Oct 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-13 21:15
Updated : 2025-10-20 17:20
NVD link : CVE-2025-62174
Mitre link : CVE-2025-62174
CVE.ORG link : CVE-2025-62174
JSON object : View
Products Affected
joinmastodon
- mastodon
CWE
CWE-613
Insufficient Session Expiration
