Changeflow GovPing Data Privacy & Cybersecurity High-Severity Vulnerability in Mastodon Allows ...
Priority review Notice Added Final

High-Severity Vulnerability in Mastodon Allows Remote Security Bypass

Favicon for www.acn.gov.it Italy ACN News alt
Published
Detected
Email

Summary

The Italian National Cybersecurity Agency (ACN) issued alert AL04/260424/CSIRT-ITA on 24 April 2026 disclosing a high-severity security vulnerability (CVE-2026-41259) in Mastodon, an open-source social network server. The vulnerability, classified as Security Feature Bypass, allows a remote attacker to circumvent security controls on affected systems. Affected versions include Mastodon 4.3.x prior to 4.3.22, 4.4.x prior to 4.4.16, and 4.5.x prior to 4.5.9. ACN rates the system impact as medium (63.46) and recommends updating vulnerable installations to patched versions as specified in the vendor security bulletin.

“Tale vulnerabilità, qualora sfruttata, potrebbe permettere a un utente malintenzionato remoto di eludere le funzionalità di sicurezza sui sistemi interessati.”

ACN , verbatim from source
Published by ACN on acn.gov.it . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors Italy ACN News alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 10 changes logged to date.

What changed

ACN's CSIRT-ITA division published a security alert documenting CVE-2026-41259, a high-severity vulnerability in Mastodon's security mechanisms. The flaw enables a remote attacker to bypass authentication or security controls on affected servers. Affected system operators should immediately update to patched versions 4.3.22, 4.4.16, or 4.5.9 as directed by the Mastodon project maintainers. No specific compliance deadlines or penalties are stated in the advisory.

Organizations running Mastodon instances should prioritize patching given the high severity rating and remote exploitation potential. System administrators should verify current installed versions and apply updates through official Mastodon release channels referenced in the advisory.

What to do next

  1. Update Mastodon to version 4.3.22, 4.4.16, 4.5.9 or later per vendor security bulletin

Archived snapshot

Apr 25, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.


Rilevata vulnerabilità in Mastodon

**
Alert**

AL04/260424/CSIRT-ITA

Condividi
- Facebook
- Twitter
- LinkedIn
- Whatsapp

Sintesi

Aggiornamenti di sicurezza sanano una vulnerabilità con gravità “alta” in Mastodon, social network server open source. Tale vulnerabilità, qualora sfruttata, potrebbe permettere a un utente malintenzionato remoto di eludere le funzionalità di sicurezza sui sistemi interessati.

Tipologia

  • Security Feature Bypass

Prodotti e versioni affette

Mastodon

  • 4.3.x, versioni precedenti alla 4.3.22
  • 4.4.x, versioni precedenti alla 4.4.16
  • 4.5.x, versioni precedenti alla 4.5.9

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di aggiornare i prodotti vulnerabili seguendo le indicazioni del bollettino di sicurezza riportato nella sezione Riferimenti.

CVE (1)

Cerca:
| CVE | POC | EXPLOITATION |
| --- | --- | --- |
| CVE-2026-41259 | - | - |

Riferimenti (1)

  1. https://github.com/mastodon/mastodon/security/advisories/GHSA-5r37-qpwq-2jhh

Change log

Versione Note Data
1.0 Pubblicato il 24-04-2026 24/04/2026

Impatto sistemico

Medio (63.46)

Argomenti

Data pubblicazione

24/04/26 ore 15:39

Data Ultimo Aggiornamento

24/04/26 ore 15:39

Get daily alerts for Italy ACN News alt

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from ACN.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
ACN
Published
April 24th, 2026
Instrument
Notice
Branch
Executive
Source language
it
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
AL04/260424/CSIRT-ITA

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability disclosure Security patching Server administration
Geographic scope
IT IT

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Consumer Finance

Get alerts for this source

We'll email you when Italy ACN News alt publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!