Mastodon is a free, open-source social network server based on ActivityPub. In Mastodon before 4.4.6, 4.3.14, and 4.2.27, when an administrator resets a user account's password via the command-line interface using `bin/tootctl accounts modify --reset-password`, active sessions and access tokens for that account are not revoked. This allows an attacker with access to a previously compromised session or token to continue using the account after the password has been reset. This issue has been patched in versions 4.2.27, 4.3.14, and 4.4.6. No known workarounds exist.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Oct 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mastodon is a free, open-source social network server based on ActivityPub. In Mastodon before 4.4.6, 4.3.14, and 4.2.27, when an administrator resets a user account's password via the command-line interface using `bin/tootctl accounts modify --reset-password`, active sessions and access tokens for that account are not revoked. This allows an attacker with access to a previously compromised session or token to continue using the account after the password has been reset. This issue has been patched in versions 4.2.27, 4.3.14, and 4.4.6. No known workarounds exist. | |
Title | Mastodon allows continued access after password reset via CLI | |
Weaknesses | CWE-613 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-13T21:01:05.528Z
Reserved: 2025-10-07T16:12:03.426Z
Link: CVE-2025-62174

No data.

Status : Received
Published: 2025-10-13T21:15:34.770
Modified: 2025-10-13T21:15:34.770
Link: CVE-2025-62174

No data.

No data.