Vulnerability Description
Mastodon is a self-hosted, federated microblogging platform. Starting in version 4.2.0 and prior to versions 4.2.16 and 4.3.4, the rate limits are missing on `/auth/setup`. Without those rate limits, an attacker can craft requests that will send an email to an arbitrary addresses. Versions 4.2.16 and 4.3.4 fix the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joinmastodon | Mastodon | >= 4.2.0, < 4.2.16 |
Related Weaknesses (CWE)
References
- https://github.com/mastodon/mastodon/commit/06f879ce9bea195344ac9f71e6799eea5006Patch
- https://github.com/mastodon/mastodon/security/advisories/GHSA-v39f-c9jj-8w7hVendor Advisory
FAQ
What is CVE-2025-27157?
CVE-2025-27157 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Mastodon is a self-hosted, federated microblogging platform. Starting in version 4.2.0 and prior to versions 4.2.16 and 4.3.4, the rate limits are missing on `/auth/setup`. Without those rate limits, ...
How severe is CVE-2025-27157?
CVE-2025-27157 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-27157?
Check the references section above for vendor advisories and patch information. Affected products include: Joinmastodon Mastodon.