CVE-2026-33868
MEDIUM NUCLEIMastodon has a GET-Based Open Redirect via '/web/%2F<domain>'
Title source: cnaDescription
Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 4.5.8, 4.4.15, and 4.3.21, an unauthenticated Open Redirect vulnerability (CWE-601) exists in the `/web/*` route due to improper handling of URL-encoded path segments. An attacker can craft a specially encoded URL that causes the application to redirect users to an arbitrary external domain, enabling phishing attacks and potential OAuth credential theft. The issue occurs because URL-encoded slashes (`%2F`) bypass Rails path normalization and are interpreted as host-relative redirects. Versions 4.5.8, 4.4.15, and 4.3.21 patch the issue.
Exploits (1)
Nuclei Templates (1)
Mastodon - Open Redirect
MEDIUMVERIFIEDby theamanrawat
Shodan:
html:"mastodon-"
Scores
CVSS v3
4.3
EPSS
0.0098
EPSS Percentile
76.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Details
CWE
CWE-601
Status
published
Products (4)
joinmastodon/mastodon
< 4.3.21
mastodon/mastodon
< 4.3.21
mastodon/mastodon
>= 4.4.0, < 4.4.15
mastodon/mastodon
>= 4.5.0, < 4.5.8
Published
Mar 27, 2026
Tracked Since
Mar 29, 2026