First published: Mon May 22 2023(Updated: )
### Impact Potential for cross-site scripting in `posthog-js`. ### Patches The problem has been patched in `posthog-js` version 1.57.2. ### Workarounds - This isn't an issue for sites that have a Content Security Policy in place. - Using the HTML tracking snippet on PostHog Cloud always guarantees the latest version of the library – in that case no action is required to upgrade to the patched version. ### References We will publish details of the vulnerability in 30 days as per our [security policy](https://posthog.com/handbook/company/security#policies).
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/posthog-js | <1.57.2 | 1.57.2 |
Posthog | <1.57.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-32325.
This vulnerability has the potential for cross-site scripting in `posthog-js`.
To fix this vulnerability, update `posthog-js` to version 1.57.2 or later.
Yes, you can mitigate this vulnerability by implementing a Content Security Policy.
The severity level of this vulnerability is medium (6.1).