top of page
perceptive_background_267k.jpg

Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /public/stream endpoint in PublicController accepts a user-supplied url query par…

Published:

1 April 2026 at 22:00:00

Alert date:

2 April 2026 at 19:04:21

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

Postiz, an AI social media scheduling tool, contains a Server-Side Request Forgery (SSRF) vulnerability in versions prior to 2.21.3. The vulnerability exists in the GET /public/stream endpoint which accepts user-supplied URL parameters and proxies HTTP responses without proper validation. The only validation performed is checking if the URL ends with 'mp4', which can be easily bypassed by appending .mp4 as a query parameter or URL fragment. This unauthenticated vulnerability allows attackers to access internal services, cloud metadata endpoints, and other network-internal resources. The issue has been patched in version 2.21.3.

Technical details

Mitigation steps:

Affected products:

Postiz

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page