


Perceptive Security
SOC/SIEM Consultancy

Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /public/stream endpoint in PublicController accepts a user-supplied url query par…
Published:
1 April 2026 at 22:00:00
Alert date:
2 April 2026 at 19:04:21
Source:
nvd.nist.gov
Web Technologies
Postiz, an AI social media scheduling tool, contains a Server-Side Request Forgery (SSRF) vulnerability in versions prior to 2.21.3. The vulnerability exists in the GET /public/stream endpoint which accepts user-supplied URL parameters and proxies HTTP responses without proper validation. The only validation performed is checking if the URL ends with 'mp4', which can be easily bypassed by appending .mp4 as a query parameter or URL fragment. This unauthenticated vulnerability allows attackers to access internal services, cloud metadata endpoints, and other network-internal resources. The issue has been patched in version 2.21.3.
Technical details
Mitigation steps:
Affected products:
Postiz
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34577
https://github.com/gitroomhq/postiz-app/releases/tag/v2.21.3
https://github.com/gitroomhq/postiz-app/security/advisories/GHSA-mv6h-v3jg-g539
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
