Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate the final destination after HTTP redirects. As a result, an attacker can supply a public HTTPS URL that passes validation and then redirects the server-side request to an internal resource.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 10 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate the final destination after HTTP redirects. As a result, an attacker can supply a public HTTPS URL that passes validation and then redirects the server-side request to an internal resource.
Title Postiz has Server-Side Request Forgery via Redirect Bypass in /api/public/stream
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-10T19:20:16.365Z

Reserved: 2026-04-09T19:31:56.014Z

Link: CVE-2026-40168

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-10T20:16:22.643

Modified: 2026-04-10T20:16:22.643

Link: CVE-2026-40168

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses