Postiz is an AI social media scheduling tool. From 1.45.1 to 1.62.3, the Postiz frontend application allows an attacker to inject arbitrary HTTP headers into the middleware pipeline. This flaw enables a server-side request forgery (SSRF) condition, which can be exploited to initiate unauthorized outbound requests from the server hosting the Postiz application. This vulnerability is fixed in 1.62.3.
Metrics
Affected Vendors & Products
References
History
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Fri, 11 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 11 Jul 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Postiz is an AI social media scheduling tool. From 1.45.1 to 1.62.3, the Postiz frontend application allows an attacker to inject arbitrary HTTP headers into the middleware pipeline. This flaw enables a server-side request forgery (SSRF) condition, which can be exploited to initiate unauthorized outbound requests from the server hosting the Postiz application. This vulnerability is fixed in 1.62.3. | |
Title | Postiz allows header mutation in middleware facilitates resulting in SSRF | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-11T17:28:20.001Z
Updated: 2025-07-11T17:56:30.605Z
Reserved: 2025-07-07T14:20:38.391Z
Link: CVE-2025-53641

Updated: 2025-07-11T17:56:24.057Z

Status : Awaiting Analysis
Published: 2025-07-11T18:15:34.963
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-53641

No data.