We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Postiz is an AI social media scheduling tool. From 1.45.1 to 1.62.3, the Postiz frontend application allows an attacker to inject arbitrary HTTP headers into the middleware pipeline. This flaw enables a server-side request forgery (SSRF) condition, which can be exploited to initiate unauthorized outbound requests from the server hosting the Postiz application. This vulnerability is fixed in 1.62.3.
Reserved 2025-07-07 | Published 2025-07-11 | Updated 2025-07-11 | Assigner GitHub_MCWE-918: Server-Side Request Forgery (SSRF)
github.com/...iz-app/security/advisories/GHSA-48c8-25jq-m55f
github.com/...ommit/65eca0e2f22155b43c78724ca43617ee52e42753
Support options