Description
Mastodon is a free, open-source social network server based on ActivityPub Mastodon which facilitates LDAP configuration for authentication. In versions 3.1.5 through 4.2.24, 4.3.0 through 4.3.11 and 4.4.0 through 4.4.3, Mastodon's rate-limiting system has a critical configuration error where the email-based throttle for confirmation emails incorrectly checks the password reset path instead of the confirmation path, effectively disabling per-email limits for confirmation requests. This allows attackers to bypass rate limits by rotating IP addresses and send unlimited confirmation emails to any email address, as only a weak IP-based throttle (25 requests per 5 minutes) remains active. The vulnerability enables denial-of-service attacks that can overwhelm mail queues and facilitate user harassment through confirmation email spam. This is fixed in versions 4.2.24, 4.3.11 and 4.4.3.
INFO
Published Date :
2025-08-05T23:39:59.130Z
Last Modified :
2025-08-06T20:32:56.740Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-54879 vulnerability.
| Vendors | Products |
|---|---|
| Joinmastodon |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-54879.