Home

Description

Postiz is an AI social media scheduling tool. From version 2.16.6 to before version 2.21.7, all SSRF protections added in v2.21.4–v2.21.6 share a fundamental TOCTOU (Time-of-Check-Time-of-Use) vulnerability: isSafePublicHttpsUrl() resolves DNS to validate the target IP, but subsequent fetch() calls resolve DNS independently. An attacker controlling a DNS server can exploit this gap via DNS rebinding to redirect requests to internal network addresses. This issue has been patched in version 2.21.7.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

>= 2.16.6, < 2.21.7
affected

References

github.com/...iz-app/security/advisories/GHSA-f7jj-p389-4w45

github.com/...ommit/071143dcb01cdeb9d5d7019892f4c6ff7b19dbeb

github.com/gitroomhq/postiz-app/releases/tag/v2.21.7

cve.org (CVE-2026-42346)

nvd.nist.gov (CVE-2026-42346)

Download JSON