First published: Wed Apr 23 2025(Updated: )
PostHog database_schema Server-Side Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the database_schema method. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-25358.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostHog |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1522 has a medium severity rating due to its potential to disclose sensitive information.
To fix CVE-2025-1522, update your PostHog installation to the latest version that addresses this vulnerability.
PostHog users with installations that allow authentication and have not implemented mitigation measures are affected by CVE-2025-1522.
CVE-2025-1522 allows remote attackers to potentially disclose sensitive information such as user data from the PostHog database.
Yes, authentication is required to exploit CVE-2025-1522.