CVE-2026-42298
Pwn Request in Postiz AI Social Media Scheduler
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| postiz | postiz | to da44801 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Postiz, an AI social media scheduling tool. It is a "Pwn Request" vulnerability in the Build and Publish PR Docker Image workflow, specifically in the .github/workflows/pr-docker-build.yml file. An unauthenticated user can exploit this by opening a Pull Request from a fork containing a maliciously modified Dockerfile.dev. This allows the attacker to execute arbitrary code during the Docker build process and exfiltrate a highly privileged GITHUB_TOKEN with write-all permissions.
The vulnerability was fixed in commit da44801.
How can this vulnerability impact me? :
This vulnerability can have severe impacts because it allows an unauthenticated attacker to execute arbitrary code within the Docker build process and steal a highly privileged GITHUB_TOKEN. This token has write-all permissions, meaning the attacker could potentially modify, delete, or create resources in the affected GitHub repository or organization, leading to unauthorized code changes, data breaches, or further compromise of the development environment.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your Postiz installation is updated to include the patch applied in commit da44801, which fixes the 'Pwn Request' vulnerability in the Build and Publish PR Docker Image workflow.
Additionally, avoid accepting pull requests from forks that modify the Dockerfile.dev without thorough review, as this vulnerability allows unauthenticated users to execute arbitrary code and exfiltrate privileged tokens.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthenticated users to execute arbitrary code and exfiltrate a highly privileged GITHUB_TOKEN with write-all permissions. Such unauthorized access and potential data exfiltration could lead to violations of data protection standards and regulations like GDPR and HIPAA, which require strict controls over access to sensitive data and systems.
Specifically, the compromise of privileged tokens and the ability to execute arbitrary code could result in unauthorized disclosure, modification, or destruction of sensitive personal or health information, thereby impacting compliance with confidentiality, integrity, and availability requirements mandated by these regulations.