CVE-2026-34577: CWE-918: Server-Side Request Forgery (SSRF) in gitroomhq postiz-app
CVE-2026-34577 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the Postiz AI social media scheduling tool by gitroomhq, affecting versions prior to 2. 21. 3. The vulnerability exists in the GET /public/stream endpoint, which accepts a user-supplied URL parameter and proxies the full HTTP response without proper validation. The only check, url. endsWith('mp4'), is easily bypassed, allowing unauthenticated attackers to access internal network resources, including cloud metadata services. Exploitation requires no authentication or user interaction, posing a significant risk to confidentiality. The issue has been patched in version 2. 21. 3.
AI Analysis
Technical Summary
CVE-2026-34577 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Postiz application, an AI-driven social media scheduling tool developed by gitroomhq. The flaw exists in the GET /public/stream endpoint within the PublicController, which accepts a user-supplied URL via the 'url' query parameter and proxies the entire HTTP response back to the requester. The endpoint performs minimal validation, only checking if the URL ends with 'mp4'. This validation is trivially bypassed by appending '.mp4' as a query parameter or URL fragment, allowing attackers to supply arbitrary URLs. Since the endpoint requires no authentication and lacks SSRF protections, attackers can exploit it to make the server perform HTTP requests to internal network resources, including sensitive cloud metadata endpoints (e.g., AWS, Azure, GCP metadata services) and other internal services not normally accessible externally. This can lead to unauthorized disclosure of sensitive information such as credentials, tokens, or configuration data. The vulnerability affects all versions of Postiz prior to 2.21.3, where the issue has been patched. The CVSS v3.1 base score is 8.6 (High), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) and the high confidentiality impact. No known exploits in the wild have been reported as of the publication date. The vulnerability is categorized under CWE-918 (Server-Side Request Forgery).
Potential Impact
The primary impact of this SSRF vulnerability is the unauthorized disclosure of sensitive internal information, which can severely compromise the confidentiality of organizational data. Attackers can leverage this flaw to access internal services that are otherwise inaccessible from the internet, including cloud provider metadata endpoints that often contain credentials or tokens for cloud resources. This can lead to further compromise of cloud infrastructure, lateral movement within internal networks, and potential data breaches. Since the vulnerability does not affect integrity or availability directly, its main risk lies in information leakage that can facilitate subsequent attacks. Organizations using vulnerable versions of Postiz risk exposure of sensitive internal data, which can undermine trust, lead to regulatory penalties, and cause operational disruptions if attackers escalate privileges or exfiltrate critical information.
Mitigation Recommendations
Organizations should immediately upgrade Postiz to version 2.21.3 or later, where the SSRF vulnerability has been patched. Until upgrading, restrict access to the vulnerable endpoint by implementing network-level controls such as firewalls or web application firewalls (WAFs) to block suspicious or external requests targeting the GET /public/stream endpoint. Employ strict input validation and sanitization on any user-supplied URLs to ensure they cannot be manipulated to access internal resources. Additionally, implement network segmentation and restrict server access to internal services and cloud metadata endpoints to minimize the attack surface. Monitoring and logging HTTP requests to detect unusual proxying behavior can help identify exploitation attempts. Finally, review cloud provider IAM roles and metadata service configurations to enforce the principle of least privilege and reduce the impact of potential SSRF attacks.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-34577: CWE-918: Server-Side Request Forgery (SSRF) in gitroomhq postiz-app
Description
CVE-2026-34577 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the Postiz AI social media scheduling tool by gitroomhq, affecting versions prior to 2. 21. 3. The vulnerability exists in the GET /public/stream endpoint, which accepts a user-supplied URL parameter and proxies the full HTTP response without proper validation. The only check, url. endsWith('mp4'), is easily bypassed, allowing unauthenticated attackers to access internal network resources, including cloud metadata services. Exploitation requires no authentication or user interaction, posing a significant risk to confidentiality. The issue has been patched in version 2. 21. 3.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34577 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Postiz application, an AI-driven social media scheduling tool developed by gitroomhq. The flaw exists in the GET /public/stream endpoint within the PublicController, which accepts a user-supplied URL via the 'url' query parameter and proxies the entire HTTP response back to the requester. The endpoint performs minimal validation, only checking if the URL ends with 'mp4'. This validation is trivially bypassed by appending '.mp4' as a query parameter or URL fragment, allowing attackers to supply arbitrary URLs. Since the endpoint requires no authentication and lacks SSRF protections, attackers can exploit it to make the server perform HTTP requests to internal network resources, including sensitive cloud metadata endpoints (e.g., AWS, Azure, GCP metadata services) and other internal services not normally accessible externally. This can lead to unauthorized disclosure of sensitive information such as credentials, tokens, or configuration data. The vulnerability affects all versions of Postiz prior to 2.21.3, where the issue has been patched. The CVSS v3.1 base score is 8.6 (High), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) and the high confidentiality impact. No known exploits in the wild have been reported as of the publication date. The vulnerability is categorized under CWE-918 (Server-Side Request Forgery).
Potential Impact
The primary impact of this SSRF vulnerability is the unauthorized disclosure of sensitive internal information, which can severely compromise the confidentiality of organizational data. Attackers can leverage this flaw to access internal services that are otherwise inaccessible from the internet, including cloud provider metadata endpoints that often contain credentials or tokens for cloud resources. This can lead to further compromise of cloud infrastructure, lateral movement within internal networks, and potential data breaches. Since the vulnerability does not affect integrity or availability directly, its main risk lies in information leakage that can facilitate subsequent attacks. Organizations using vulnerable versions of Postiz risk exposure of sensitive internal data, which can undermine trust, lead to regulatory penalties, and cause operational disruptions if attackers escalate privileges or exfiltrate critical information.
Mitigation Recommendations
Organizations should immediately upgrade Postiz to version 2.21.3 or later, where the SSRF vulnerability has been patched. Until upgrading, restrict access to the vulnerable endpoint by implementing network-level controls such as firewalls or web application firewalls (WAFs) to block suspicious or external requests targeting the GET /public/stream endpoint. Employ strict input validation and sanitization on any user-supplied URLs to ensure they cannot be manipulated to access internal resources. Additionally, implement network segmentation and restrict server access to internal services and cloud metadata endpoints to minimize the attack surface. Monitoring and logging HTTP requests to detect unusual proxying behavior can help identify exploitation attempts. Finally, review cloud provider IAM roles and metadata service configurations to enforce the principle of least privilege and reduce the impact of potential SSRF attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-30T16:56:30.998Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cea98de6bfc5ba1defd63e
Added to database: 4/2/2026, 5:38:21 PM
Last enriched: 4/2/2026, 5:53:33 PM
Last updated: 4/2/2026, 6:53:12 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.