๐Ÿ” CVE Alert

CVE-2026-34576

UNKNOWN 0.0

Postiz: SSRF in upload-from-url endpoint allows fetching internal resources and cloud metadata

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the POST /public/v1/upload-from-url endpoint accepts a user-supplied URL and fetches it server-side using axios.get() with no SSRF protections. The only validation is a file extension check (.png, .jpg, etc.) which is trivially bypassed by appending an image extension to any URL path. An authenticated API user can fetch internal network resources, cloud instance metadata, and other internal services, with the response data uploaded to storage and returned to the attacker. This issue has been patched in version 2.21.3.

CWE CWE-918
Vendor gitroomhq
Product postiz-app
Published Apr 2, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for gitroomhq postiz-app

Be the first to know when new unknown vulnerabilities affecting gitroomhq postiz-app are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

gitroomhq / postiz-app
< 2.21.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gitroomhq/postiz-app/security/advisories/GHSA-89vp-m2qw-7v34 github.com: https://github.com/gitroomhq/postiz-app/releases/tag/v2.21.3