Description

Postiz is an AI social media scheduling tool. Prior to version 2.21.4, the POST /webhooks/ endpoint for creating webhooks uses WebhooksDto which validates the url field with only @IsUrl() (format check), missing the @IsSafeWebhookUrl validator that blocks internal/private network addresses. The update (PUT /webhooks/) and test (POST /webhooks/send) endpoints correctly apply @IsSafeWebhookUrl. When a post is published, the orchestrator fetches the stored webhook URL without runtime validation, enabling blind SSRF against internal services. This issue has been patched in version 2.21.4.

INFO

Published Date :

2026-04-02T17:26:58.902Z

Last Modified :

2026-04-03T15:49:51.856Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-34590 vulnerability.

Vendors Products
Gitroom
  • Postiz
Gitroomhq
  • Postiz-app

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact