Description
Postiz is an AI social media scheduling tool. From version 2.16.6 to before version 2.21.7, all SSRF protections added in v2.21.4–v2.21.6 share a fundamental TOCTOU (Time-of-Check-Time-of-Use) vulnerability: isSafePublicHttpsUrl() resolves DNS to validate the target IP, but subsequent fetch() calls resolve DNS independently. An attacker controlling a DNS server can exploit this gap via DNS rebinding to redirect requests to internal network addresses. This issue has been patched in version 2.21.7.
Published: 2026-05-08
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Postiz versions 2.16.6 through 2.21.6 contain a Time‑of‑Check-to‑Time‑of‑Use flaw in the isSafePublicHttpsUrl() routine. The function first resolves a domain to an IP address for validation, but later fetch() calls independently resolve DNS again. This gap allows an attacker who controls a DNS server to redirect requests during the window between the check and the use, making the application reach internal network addresses through DNS rebinding. The result is that an external adversary can force the server to make requests to protected internal resources, potentially exposing sensitive data or enabling further lateral movement. The weakness maps to CWE‑918: Server‑Side Request Forgery.

Affected Systems

GitroomHQ Postiz‑app is affected from version 2.16.6 up to, but not including, version 2.21.7. Any deployment of those releases in an environment where untrusted DNS responses can be injected is vulnerable. Version 2.21.7 and subsequent releases include a patch that removes the TOCTOU gap.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity issue. While the EPSS metric is not available, the vulnerability is not recorded in the CISA KEV catalog. Likely attack vectors involve an attacker who can influence the DNS resolution for URLs processed by the application, such as by hosting a malicious domain or exploiting a misconfigured DNS resolver. Because the flaw relies on DNS rebinding, an exploit requires control over DNS responses rather than direct access to the target system. The attack bypasses all SSRF‑related URL validation paths in the affected releases, enabling unauthorized internal network access.

Generated by OpenCVE AI on May 8, 2026 at 23:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Postiz to version 2.21.7 or later, where the TOCTOU issue has been fixed.
  • Configure the application or underlying infrastructure to use a trusted internal DNS server only, thereby preventing the acceptance of malicious DNS rebinding responses.
  • Implement network segmentation and firewall rules that block outbound connections from the application to internal IP ranges that are not intended to be reachable from the Internet.

Generated by OpenCVE AI on May 8, 2026 at 23:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Gitroomhq
Gitroomhq postiz-app
Vendors & Products Gitroomhq
Gitroomhq postiz-app

Fri, 08 May 2026 22:45:00 +0000

Type Values Removed Values Added
Description Postiz is an AI social media scheduling tool. From version 2.16.6 to before version 2.21.7, all SSRF protections added in v2.21.4–v2.21.6 share a fundamental TOCTOU (Time-of-Check-Time-of-Use) vulnerability: isSafePublicHttpsUrl() resolves DNS to validate the target IP, but subsequent fetch() calls resolve DNS independently. An attacker controlling a DNS server can exploit this gap via DNS rebinding to redirect requests to internal network addresses. This issue has been patched in version 2.21.7.
Title Postiz: TOCTOU DNS rebinding bypasses all SSRF URL validation paths
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

Gitroomhq Postiz-app
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T22:26:50.501Z

Reserved: 2026-04-26T13:26:14.515Z

Link: CVE-2026-42346

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T23:16:37.903

Modified: 2026-05-08T23:16:37.903

Link: CVE-2026-42346

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T00:00:25Z

Weaknesses