Home

Description

Postiz is an AI social media scheduling tool. Prior to version 2.21.4, the POST /webhooks/ endpoint for creating webhooks uses WebhooksDto which validates the url field with only @IsUrl() (format check), missing the @IsSafeWebhookUrl validator that blocks internal/private network addresses. The update (PUT /webhooks/) and test (POST /webhooks/send) endpoints correctly apply @IsSafeWebhookUrl. When a post is published, the orchestrator fetches the stored webhook URL without runtime validation, enabling blind SSRF against internal services. This issue has been patched in version 2.21.4.

PUBLISHED Reserved 2026-03-30 | Published 2026-04-02 | Updated 2026-04-03 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 2.21.4
affected

References

github.com/...iz-app/security/advisories/GHSA-wc9c-7cv8-m225

github.com/...ommit/5ae4c950db6aa516a31454b7a45b9480bca40a11

github.com/gitroomhq/postiz-app/releases/tag/v2.21.4

cve.org (CVE-2026-34590)

nvd.nist.gov (CVE-2026-34590)

Download JSON