CVE-2026-42298 - Postiz: Arbitrary Code Execution and Token Exfiltration in pr-docker-build.yml via untrusted Dockerfile.dev
CVE ID :CVE-2026-42298 Published : May 8, 2026, 10:24 p.m. | 39 minutes ago Description :Postiz is an AI social media scheduling tool. Prior to commit da44801, a "Pwn Request" vulnerability in the Build and Publish PR Docker Image workflow (.github/workflows/pr-docker-build.yml) allows any una
ORIGINAL SOURCE →via CVE Feed Latest
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] The Auth0 Pricing Trap: Why Upgrading to Paid Gives You Less
- [CYBER] Massive canvas hack exposes millions of students during exam season.
- [CYBER] AI Is Breaking Two Vulnerability Cultures — And Vibe Coders Are About to Get Caught in the Middle
- [CYBER] CVE-2026-44313 - LinkWarden: Server-Side Request Forgery (SSRF) in Link Creation via fetchTitleAndHeaders Function
- [CYBER] CVE-2026-42455 - LinkWarden: Stored XSS via Client-Side Archive Upload (Unsanitized HTML served from same origin)
- [CYBER] Why AI agent governance feels harder than traditional security models