Server-Side Request Forgery Vulnerability in Postiz AI Scheduling Tool
CVE-2026-34576

8.3HIGH

Key Information:

Vendor

Gitroomhq

Vendor
CVE Published:
2 April 2026

What is CVE-2026-34576?

Postiz, a popular AI social media scheduling tool, has a vulnerability that affects versions prior to 2.21.3. The flaw resides in the '/public/v1/upload-from-url' endpoint, which inadequately secures user-supplied URLs. The mechanism primarily offers a basic validation through file extension checks, which can be easily circumvented. As a result, authenticated API users could exploit this weakness to retrieve internal network resources, access sensitive cloud instance metadata, and obtain other unprotected internal services. The malicious response data risks being uploaded to the system storage, which could lead to significant data exposure or abuse. This vulnerability has been addressed in version 2.21.3.

Affected Version(s)

postiz-app < 2.21.3

References

CVSS V4

Score:
8.3
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.