Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gitroom
Gitroom postiz |
|
| CPEs | cpe:2.3:a:gitroom:postiz:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gitroom
Gitroom postiz |
Mon, 13 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gitroomhq
Gitroomhq postiz-app |
|
| Vendors & Products |
Gitroomhq
Gitroomhq postiz-app |
Fri, 10 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate the final destination after HTTP redirects. As a result, an attacker can supply a public HTTPS URL that passes validation and then redirects the server-side request to an internal resource. | |
| Title | Postiz has Server-Side Request Forgery via Redirect Bypass in /api/public/stream | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-13T20:55:15.792Z
Reserved: 2026-04-09T19:31:56.014Z
Link: CVE-2026-40168
Updated: 2026-04-13T20:55:11.223Z
Status : Analyzed
Published: 2026-04-10T20:16:22.643
Modified: 2026-04-14T20:09:03.727
Link: CVE-2026-40168
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:00:07Z