Security News > 2024 > February > Lagging Mastodon admins urged to patch critical account takeover flaw (CVE-2024-23832)

Five days after Mastodon developers pushed out fixes for a remotely exploitable account takeover vulnerability, over 66% of Mastodon servers out there have been upgraded to close the hole.
Mastodon is open-source software for running self-hosted social networking services within the wider Fediverse.
Mastodon users gather on a variety of different servers, run by different people or organizations, which makes the uptake of the latest security updates quite impressive.
"Every Mastodon version prior to 3.5.17 is vulnerable, as well as 4.0.x versions prior to 4.0.13, 4.1.x version prior to 4.1.13, and 4.2.x versions prior to 4.2.5.".
Mastodon server admins have been alerted to the necessity of implementing the critical security update via email and via unmissable prompts in the admin panel, which might explain the satisfactory uptake of security updates.
This is not the first time that a critical, easily exploited vulnerability has been fixed in the Mastodon software.
News URL
https://www.helpnetsecurity.com/2024/02/06/cve-2024-23832/
Related news
- SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation (source)
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891) (source)
- Patch now: Cisco fixes critical 9.9-rated, make-me-admin bug in Meeting Management (source)
- Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution (source)
- Netgear warns users to patch critical WiFi router vulnerabilities (source)