A successful SSRF attack allows an attacker to: - Bypass firewalls to scan and interact with internal network services/ports. - Access sensitive cloud metadata services (e.g., AWS IMDS 169.254.169.254) to potentially leak instance credentials. - Pivot into the internal network environment where Postiz is hosted.
There are no workarounds known to this, please upgrade to Postiz version v2.21.1.
{
"cwe_ids": [
"CWE-1395",
"CWE-918"
],
"github_reviewed_at": "2026-03-27T15:46:53Z",
"nvd_published_at": null,
"github_reviewed": true,
"severity": "HIGH"
}