CVE-2026-34577

Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /public/stream endpoint in PublicController accepts a user-supplied url query parameter and proxies the full HTTP response back to the caller. The only validation is url.endsWith('mp4'), which is trivially bypassable by appending .mp4 as a query parameter value or URL fragment. The endpoint requires no authentication and has no SSRF protections, allowing an unauthenticated attacker to read responses from internal services, cloud metadata endpoints, and other network-internal resources. This issue has been patched in version 2.21.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gitroom:postiz:*:*:*:*:*:*:*:*

History

07 Apr 2026, 21:21

Type Values Removed Values Added
First Time Gitroom
Gitroom postiz
References () https://github.com/gitroomhq/postiz-app/releases/tag/v2.21.3 - () https://github.com/gitroomhq/postiz-app/releases/tag/v2.21.3 - Product, Release Notes
References () https://github.com/gitroomhq/postiz-app/security/advisories/GHSA-mv6h-v3jg-g539 - () https://github.com/gitroomhq/postiz-app/security/advisories/GHSA-mv6h-v3jg-g539 - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:gitroom:postiz:*:*:*:*:*:*:*:*

02 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 18:16

Updated : 2026-04-07 21:21


NVD link : CVE-2026-34577

Mitre link : CVE-2026-34577

CVE.ORG link : CVE-2026-34577


JSON object : View

Products Affected

gitroom

  • postiz
CWE
CWE-918

Server-Side Request Forgery (SSRF)