CVE-2026-23962

7.5 HIGH

📋 TL;DR

Mastodon servers running vulnerable versions allow attackers to create remote posts with unlimited poll options, causing excessive resource consumption. This can lead to denial of service on both servers and clients. All Mastodon instances before patched versions are affected.

💻 Affected Systems

Products:
  • Mastodon
Versions: All versions before v4.3.18, v4.4.12, and v4.5.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both server and client components when processing remote posts with polls.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server unavailability due to resource exhaustion, affecting all users and potentially causing cascading failures in federated networks.

🟠

Likely Case

Degraded server performance, increased response times, and potential service interruptions during attack periods.

🟢

If Mitigated

Minimal impact with proper rate limiting and monitoring in place, though still vulnerable to targeted attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires creating or interacting with remote posts containing polls with excessive options.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.5.5, v4.4.12, or v4.3.18

Vendor Advisory: https://github.com/mastodon/mastodon/security/advisories/GHSA-gg8q-rcg7-p79g

Restart Required: Yes

Instructions:

1. Backup your Mastodon instance. 2. Update to v4.5.5, v4.4.12, or v4.3.18 using your package manager or git. 3. Run bundle install and yarn install. 4. Run database migrations. 5. Restart Mastodon services.

🔧 Temporary Workarounds

Rate limit poll creation

all

Implement application-level rate limiting for poll creation endpoints

Configure rate limiting in nginx/apache or application firewall

Block suspicious remote instances

all

Temporarily block instances sending posts with excessive poll options

Use Mastodon admin interface to block domains

🧯 If You Can't Patch

  • Implement strict rate limiting on poll creation endpoints
  • Monitor for unusual poll activity and block offending instances

🔍 How to Verify

Check if Vulnerable:

Check Mastodon version against affected versions

Check Version:

grep VERSION /opt/mastodon/.env.production or check admin interface

Verify Fix Applied:

Confirm version is v4.5.5, v4.4.12, or v4.3.18 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusually large poll creation requests
  • Spike in memory/CPU usage
  • Timeout errors on poll endpoints

Network Indicators:

  • High volume of POST requests to poll endpoints
  • Large payloads to /api/v1/polls

SIEM Query:

source="mastodon.logs" AND ("poll" AND "options") | stats count by src_ip

🔗 References

📤 Share & Export