First published: Wed Apr 23 2025(Updated: )
PostHog slack_incoming_webhook Server-Side Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of the slack_incoming_webhook parameter. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-25352.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostHog |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1521 is classified as a medium severity vulnerability.
CVE-2025-1521 is a Server-Side Request Forgery (SSRF) vulnerability.
To fix CVE-2025-1521, update to the latest version of PostHog that addresses the vulnerability.
CVE-2025-1521 affects installations of PostHog that have the slack_incoming_webhook feature enabled.
Attackers can exploit CVE-2025-1521 to disclose sensitive information from affected PostHog installations.