We found results for “”
CVE-2025-62174
Good to know:
Date: October 13, 2025
Mastodon is an open source, federated social media platform. In Mastodon before 4.4.6, 4.3.14, and 4.2.27, when an administrator resets a user account's password via the command-line interface using "bin/tootctl accounts modify --reset-password", active sessions and access tokens for that account are not revoked. This allows an attacker with access to a previously compromised session or token to continue using the account after the password has been reset. This issue has been patched in versions 4.2.27, 4.3.14, and 4.4.6. No known workarounds exist.
Severity Score
Severity Score
Weakness Type (CWE)
Insufficient Session Expiration
CWE-613Top Fix
Upgrade Version
Upgrade to version https://github.com/mastodon/mastodon.git - v4.2.27;https://github.com/mastodon/mastodon.git - v4.3.14;https://github.com/mastodon/mastodon.git - v4.4.6
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


