Mastodon is a free, open-source social network server based on ActivityPub. In Mastodon before 4.4.6, 4.3.14, and 4.2.27, when an administrator resets a user account's password via the command-line interface using `bin/tootctl accounts modify --reset-password`, active sessions and access tokens for that account are not revoked. This allows an attacker with access to a previously compromised session or token to continue using the account after the password has been reset. This issue has been patched in versions 4.2.27, 4.3.14, and 4.4.6. No known workarounds exist.
History

Mon, 20 Oct 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Joinmastodon
Joinmastodon mastodon
CPEs cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*
Vendors & Products Joinmastodon
Joinmastodon mastodon

Tue, 14 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Description Mastodon is a free, open-source social network server based on ActivityPub. In Mastodon before 4.4.6, 4.3.14, and 4.2.27, when an administrator resets a user account's password via the command-line interface using `bin/tootctl accounts modify --reset-password`, active sessions and access tokens for that account are not revoked. This allows an attacker with access to a previously compromised session or token to continue using the account after the password has been reset. This issue has been patched in versions 4.2.27, 4.3.14, and 4.4.6. No known workarounds exist.
Title Mastodon allows continued access after password reset via CLI
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-10-13T20:54:36.040Z

Updated: 2025-10-14T14:00:54.691Z

Reserved: 2025-10-07T16:12:03.426Z

Link: CVE-2025-62174

cve-icon Vulnrichment

Updated: 2025-10-14T14:00:51.153Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-13T21:15:34.770

Modified: 2025-10-20T17:20:08.917

Link: CVE-2025-62174

cve-icon Redhat

No data.