CVE-2026-42298
Received Received - Intake
Pwn Request in Postiz AI Social Media Scheduler

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: GitHub, Inc.

Description
Postiz is an AI social media scheduling tool. Prior to commit da44801, a "Pwn Request" vulnerability in the Build and Publish PR Docker Image workflow (.github/workflows/pr-docker-build.yml) allows any unauthenticated user to execute arbitrary code during the Docker build process and exfiltrate a highly privileged GITHUB_TOKEN (write-all permissions). This can be achieved simply by opening a Pull Request from a fork with a maliciously modified Dockerfile.dev. This issue has been patched via commit da44801.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-09
EPSS Evaluated
N/A
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
postiz postiz to da44801 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Postiz, an AI social media scheduling tool. It is a "Pwn Request" vulnerability in the Build and Publish PR Docker Image workflow, specifically in the .github/workflows/pr-docker-build.yml file. An unauthenticated user can exploit this by opening a Pull Request from a fork containing a maliciously modified Dockerfile.dev. This allows the attacker to execute arbitrary code during the Docker build process and exfiltrate a highly privileged GITHUB_TOKEN with write-all permissions.

The vulnerability was fixed in commit da44801.


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows an unauthenticated attacker to execute arbitrary code within the Docker build process and steal a highly privileged GITHUB_TOKEN. This token has write-all permissions, meaning the attacker could potentially modify, delete, or create resources in the affected GitHub repository or organization, leading to unauthorized code changes, data breaches, or further compromise of the development environment.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that your Postiz installation is updated to include the patch applied in commit da44801, which fixes the 'Pwn Request' vulnerability in the Build and Publish PR Docker Image workflow.

Additionally, avoid accepting pull requests from forks that modify the Dockerfile.dev without thorough review, as this vulnerability allows unauthenticated users to execute arbitrary code and exfiltrate privileged tokens.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated users to execute arbitrary code and exfiltrate a highly privileged GITHUB_TOKEN with write-all permissions. Such unauthorized access and potential data exfiltration could lead to violations of data protection standards and regulations like GDPR and HIPAA, which require strict controls over access to sensitive data and systems.

Specifically, the compromise of privileged tokens and the ability to execute arbitrary code could result in unauthorized disclosure, modification, or destruction of sensitive personal or health information, thereby impacting compliance with confidentiality, integrity, and availability requirements mandated by these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart