๐Ÿ” CVE Alert

CVE-2026-40168

HIGH 8.2

Postiz has Server-Side Request Forgery via Redirect Bypass in /api/public/stream

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
12th

Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate the final destination after HTTP redirects. As a result, an attacker can supply a public HTTPS URL that passes validation and then redirects the server-side request to an internal resource.

CWE CWE-918
Vendor gitroomhq
Product postiz-app
Published Apr 10, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for gitroomhq postiz-app

Be the first to know when new high vulnerabilities affecting gitroomhq postiz-app are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Affected Versions

gitroomhq / postiz-app
< 2.21.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gitroomhq/postiz-app/security/advisories/GHSA-34w8-5j2v-h6ww github.com: https://github.com/gitroomhq/postiz-app/commit/30e8b777098157362769226d1b46d83ad616cb06 github.com: https://github.com/gitroomhq/postiz-app/releases/tag/v2.21.5