Home

Description

Postiz is an AI social media scheduling tool. From version 2.21.6 to before version 2.21.7, any authenticated user who can create a post can store arbitrary HTML in post content by tampering their own save request and send the public preview link /p/<postId>?share=true to another user. The preview page renders that stored HTML with dangerouslySetInnerHTML on the main application origin. This issue has been patched in version 2.21.7.

PUBLISHED Reserved 2026-04-28 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




HIGH: 8.9CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 2.21.6, < 2.21.7
affected

References

github.com/...iz-app/security/advisories/GHSA-hhxq-3wg7-4rj8

github.com/gitroomhq/postiz-app/releases/tag/v2.21.7

cve.org (CVE-2026-42556)

nvd.nist.gov (CVE-2026-42556)

Download JSON