Cyber Posture

CVE-2026-23962

High

Published: 22 January 2026

Published
22 January 2026
Modified
02 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0002 6.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23962 is a high-severity Allocation of Resources Without Limits or Throttling (CWE-770) vulnerability in Joinmastodon Mastodon. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-770

This control implements explicit throttling on session allocation, addressing the weakness of allocating resources without limits.

addresses: CWE-770

Plan testing exercises resource allocation limits and throttling during simulated failures, directly addressing weaknesses that allow unbounded resource use.

addresses: CWE-770

Contingency plan updates ensure recovery strategies address unbounded resource allocation, making it harder for attackers to exploit lack of throttling to cause prolonged outages.

addresses: CWE-770

Provides continuity when unbounded resource allocation at the primary site leads to exhaustion and downtime.

addresses: CWE-770

Alternate services allow operations to continue when primary allocation of resources lacks limits or throttling.

addresses: CWE-770

Explicit planning of security-related actions requires defining limits, windows, and resource allocations, making allocation without throttling far less likely.

addresses: CWE-770

Measures of performance include tracking allocation behavior and throttling effectiveness, reducing the window for resource exhaustion attacks.

addresses: CWE-770

Imposes an inactivity-based limit on network resource allocation, throttling the number of concurrently held connections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Direct exploitation of public-facing Mastodon server via remote ActivityPub content to trigger application resource exhaustion DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Mastodon is a free, open-source social network server based on ActivityPub. Mastodon versions before v4.3.18, v4.4.12, and v4.5.5 do not have a limit on the maximum number of poll options for remote posts, allowing attackers to create polls with a…

more

very large amount of options, greatly increasing resource consumption. Depending on the number of poll options, an attacker can cause disproportionate resource usage in both Mastodon servers and clients, potentially causing Denial of Service either server-side or client-side. Mastodon versions v4.5.5, v4.4.12, v4.3.18 are patched.

Deeper analysisAI

CVE-2026-23962 is a resource exhaustion vulnerability in Mastodon, a free, open-source social network server based on ActivityPub. Affected versions are those prior to v4.3.18, v4.4.12, and v4.5.5, where there is no limit on the maximum number of poll options in remote posts. This allows attackers to create polls with an excessively large number of options, leading to greatly increased resource consumption and potential denial-of-service (DoS) conditions. The vulnerability is rated with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-770 (Allocation of Resources Without Limits or Throttling).

Any unauthenticated attacker with network access can exploit this vulnerability by posting remote content containing a poll with a very large number of options. The disproportionate resource usage impacts both Mastodon servers and clients, depending on the scale of options included, resulting in server-side or client-side DoS.

Mitigation is available through patches released in Mastodon versions v4.3.18, v4.4.12, and v4.5.5, as detailed in the corresponding GitHub release notes and the security advisory GHSA-gg8q-rcg7-p79g. Administrators should upgrade to one of these fixed versions to prevent exploitation.

Details

CWE(s)

Affected Products

joinmastodon
mastodon
≤ 4.3.18 · 4.4.0 — 4.4.12 · 4.5.0 — 4.5.5

CVEs Like This One

CVE-2026-41259Same product: Joinmastodon Mastodon
CVE-2026-22245Same product: Joinmastodon Mastodon
CVE-2026-27468Same product: Joinmastodon Mastodon
CVE-2026-20103Shared CWE-770
CVE-2025-1059Shared CWE-770
CVE-2026-1848Shared CWE-770
CVE-2026-29168Shared CWE-770
CVE-2026-33258Shared CWE-770
CVE-2026-32280Shared CWE-770
CVE-2026-7776Shared CWE-770

References