File Upload Validation Bypass in Postiz AI Social Media Tool
CVE-2026-40487
Key Information:
- Vendor
Gitroomhq
- Status
- Vendor
- CVE Published:
- 18 April 2026
Badges
What is CVE-2026-40487?
Prior to version 2.21.6, the Postiz AI social media scheduling tool contained a vulnerability that allowed authenticated users to exploit a file upload validation bypass. By manipulating the Content-Type header, it became possible for users to upload potentially harmful files, such as HTML and SVG, to the server. These files were served with an appropriate Content-Type based on their extensions, which could subsequently lead to Stored Cross-Site Scripting (XSS) attacks. This vulnerability poses serious risks, including session riding and unauthorized account access, jeopardizing the security and privacy of users within the application.
Affected Version(s)
postiz-app < 2.21.6
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
