Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
4.8

Mastodon: Unapproved FASP Actions Allow DOS Attacks

CVE-2026-27468
Summary

Mastodon servers with the experimental FASP feature enabled are at risk of denial-of-service attacks if an attacker can subscribe to events or request content without admin approval. This affects only servers that have the `EXPERIMENTAL_FEATURES` variable set to include `fasp`. Update to version 4.4.14 or 4.5.7 to patch the issue.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
joinmastodon mastodon > 4.4.0 , <= 4.4.14
joinmastodon mastodon > 4.5.0 , <= 4.5.7
Original title
Mastodon is a free, open-source social network server based on ActivityPub. FASP registration requires manual approval by an administrator. In versions 4.4.0 through 4.4.13 and 4.5.0 through 4.5.6,...
Original description
Mastodon is a free, open-source social network server based on ActivityPub. FASP registration requires manual approval by an administrator. In versions 4.4.0 through 4.4.13 and 4.5.0 through 4.5.6, actions performed by a FASP to subscribe to account/content lifecycle events or to backfill content did not check properly whether the FASP was actually approved. This only affects Mastodon servers that have opted in to testing the experimental FASP feature by setting the environment variable `EXPERIMENTAL_FEATURES` to a value including `fasp`. An attacker can make subscriptions and request content backfill without approval by an administrator. Done once, this leads to minor information leak of URIs that are publicly available anyway. But done several times this is a serious vector for DOS, putting pressure on the sidekiq worker responsible for the `fasp` queue. The fix is included in the 4.4.14 and 4.5.7 releases. Admins that are actively testing the experimental "fasp" feature should update their systems. Servers not using the experimental feature flag `fasp` are not affected.
nvd CVSS3.1 8.2
nvd CVSS4.0 4.8
Vulnerability type
CWE-862 Missing Authorization
Published: 24 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026