Description
Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate the final destination after HTTP redirects. As a result, an attacker can supply a public HTTPS URL that passes validation and then redirects the server-side request to an internal resource.
Published: 2026-04-10
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

The vulnerability is a server‑side request forgery that allows an attacker to force the application to retrieve a URL that initially appears valid but ultimately redirects to an internal host. Because the server reuses the initial validation without checking the final destination, it fetches the internal resource unimpeded. This flaw, classified as CWE‑918, permits unauthorized access to internal network services, potentially exposing sensitive data or allowing further internal exploitation. The attack can be performed remotely by sending a crafted request to the /api/public/stream endpoint. Affected systems include the GitRoomHQ Postiz application, versions released before 2.21.5. Any deployment of Postiz that has not applied the 2.21.5 update is vulnerable. The vulnerability applies to all installations where the /api/public/stream endpoint is exposed, regardless of user role. Risk assessment indicates a high severity score of 8.2 on CVSS, suggesting significant potential impact. The EPSS score is below 1%, implying a low probability of exploitation at this time, and the vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is a remote HTTP request that passes initial validation but follows a redirect to an internal target.

Affected Systems

The vulnerability affects the GitRoomHQ Postiz application before version 2.21.5. Any installations using prior releases that expose the /api/public/stream endpoint are at risk. No specific platform details are available beyond the Postiz app itself.

Risk and Exploitability

The CVSS score of 8.2 reflects a high severity due to the potential for unauthorized internal network access. An attacker could exploit the flaw remotely by crafting a request that leverages server‑side redirects to reach internal services. The EPSS score of less than 1% suggests that the likelihood of exploitation remains low at present, and the vulnerability has not yet been listed in the CISA KEV catalog.

Generated by OpenCVE AI on April 15, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Postiz to version 2.21.5 or later.
  • Restrict access to the /api/public/stream endpoint by firewall rules or authentication so that only trusted users or IPs can invoke it.
  • Enable detailed logging of outgoing HTTPS requests from the server and monitor for unexpected internal host accesses.

Generated by OpenCVE AI on April 15, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Gitroom
Gitroom postiz
CPEs cpe:2.3:a:gitroom:postiz:*:*:*:*:*:*:*:*
Vendors & Products Gitroom
Gitroom postiz

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Gitroomhq
Gitroomhq postiz-app
Vendors & Products Gitroomhq
Gitroomhq postiz-app

Fri, 10 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate the final destination after HTTP redirects. As a result, an attacker can supply a public HTTPS URL that passes validation and then redirects the server-side request to an internal resource.
Title Postiz has Server-Side Request Forgery via Redirect Bypass in /api/public/stream
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}


Subscriptions

Gitroom Postiz
Gitroomhq Postiz-app
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T20:55:15.792Z

Reserved: 2026-04-09T19:31:56.014Z

Link: CVE-2026-40168

cve-icon Vulnrichment

Updated: 2026-04-13T20:55:11.223Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T20:16:22.643

Modified: 2026-04-14T20:09:03.727

Link: CVE-2026-40168

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:00:07Z

Weaknesses