CVE-2026-33868

MEDIUM NUCLEI

Mastodon has a GET-Based Open Redirect via '/web/%2F<domain>'

Title source: cna

Description

Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 4.5.8, 4.4.15, and 4.3.21, an unauthenticated Open Redirect vulnerability (CWE-601) exists in the `/web/*` route due to improper handling of URL-encoded path segments. An attacker can craft a specially encoded URL that causes the application to redirect users to an arbitrary external domain, enabling phishing attacks and potential OAuth credential theft. The issue occurs because URL-encoded slashes (`%2F`) bypass Rails path normalization and are interpreted as host-relative redirects. Versions 4.5.8, 4.4.15, and 4.3.21 patch the issue.

Exploits (1)

nomisec SCANNER 2 stars
by O99099O · poc
https://github.com/O99099O/By-Poloss..-..CVE-2026-33868

Nuclei Templates (1)

Mastodon - Open Redirect
MEDIUMVERIFIEDby theamanrawat
Shodan: html:"mastodon-"

Scores

CVSS v3 4.3
EPSS 0.0098
EPSS Percentile 76.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Details

CWE
CWE-601
Status published
Products (4)
joinmastodon/mastodon < 4.3.21
mastodon/mastodon < 4.3.21
mastodon/mastodon >= 4.4.0, < 4.4.15
mastodon/mastodon >= 4.5.0, < 4.5.8
Published Mar 27, 2026
Tracked Since Mar 29, 2026