First published: Wed Apr 23 2025(Updated: )
PostHog ClickHouse Table Functions SQL Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of PostHog. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the SQL parser. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the database account. Was ZDI-CAN-25350.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@posthog/plugin-server | <=1.10.7 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1520 is rated as a critical severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2025-1520, ensure you update PostHog to the latest version where the vulnerability has been patched.
CVE-2025-1520 affects installations of PostHog that have not been updated to the patched versions.
CVE-2025-1520 enables network-adjacent attackers to execute arbitrary code on the affected PostHog installations.
Yes, authentication is required to exploit CVE-2025-1520.