Description
PostHog provides open-source product analytics, session recording, feature flagging and A/B testing that you can self-host. A server-side request forgery (SSRF), which can only be exploited by authenticated users, was found in Posthog. Posthog did not verify whether a URL was local when enabling webhooks, allowing authenticated users to forge a POST request. This vulnerability has been addressed in `22bd5942` and will be included in subsequent releases. There are no known workarounds for this vulnerability.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/PostHog/posthog/security/advisories/GHSA-wqqw-r8c5-j67c
Patch x_refsource_misc
https://github.com/PostHog/posthog/commit/22bd5942638d5d9bc4bd603a9bfe8f8a95572292
Various Sources x_refsource_misc
https://securitylab.github.com/advisories/GHSL-2023-185_posthog_posthog/
Scores
CVSS v3
4.8
EPSS
0.0006
EPSS Percentile
19.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Details
CWE
CWE-918
Status
published
Products (1)
posthog/posthog
< 1.43.1
Published
Dec 01, 2023
Tracked Since
Feb 18, 2026