Vulnerability Details CVE-2023-46746
PostHog provides open-source product analytics, session recording, feature flagging and A/B testing that you can self-host. A server-side request forgery (SSRF), which can only be exploited by authenticated users, was found in Posthog. Posthog did not verify whether a URL was local when enabling webhooks, allowing authenticated users to forge a POST request. This vulnerability has been addressed in `22bd5942` and will be included in subsequent releases. There are no known workarounds for this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.0%
CVSS Severity
CVSS v3 Score 4.8
Products affected by CVE-2023-46746
-
cpe:2.3:a:posthog:posthog:-
-
cpe:2.3:a:posthog:posthog:1.0.0
-
cpe:2.3:a:posthog:posthog:1.0.1
-
cpe:2.3:a:posthog:posthog:1.0.10
-
cpe:2.3:a:posthog:posthog:1.0.10.1
-
cpe:2.3:a:posthog:posthog:1.0.10.2
-
cpe:2.3:a:posthog:posthog:1.0.11
-
cpe:2.3:a:posthog:posthog:1.0.2
-
cpe:2.3:a:posthog:posthog:1.0.3
-
cpe:2.3:a:posthog:posthog:1.0.4
-
cpe:2.3:a:posthog:posthog:1.0.5
-
cpe:2.3:a:posthog:posthog:1.0.6
-
cpe:2.3:a:posthog:posthog:1.0.7
-
cpe:2.3:a:posthog:posthog:1.0.8
-
cpe:2.3:a:posthog:posthog:1.0.8.1
-
cpe:2.3:a:posthog:posthog:1.0.8.2
-
cpe:2.3:a:posthog:posthog:1.0.8.3
-
cpe:2.3:a:posthog:posthog:1.0.9
-
cpe:2.3:a:posthog:posthog:1.1.0
-
cpe:2.3:a:posthog:posthog:1.1.0.1
-
cpe:2.3:a:posthog:posthog:1.10.0
-
cpe:2.3:a:posthog:posthog:1.10.1
-
cpe:2.3:a:posthog:posthog:1.11.0
-
cpe:2.3:a:posthog:posthog:1.12.0
-
cpe:2.3:a:posthog:posthog:1.12.1
-
cpe:2.3:a:posthog:posthog:1.13.0
-
cpe:2.3:a:posthog:posthog:1.14.0
-
cpe:2.3:a:posthog:posthog:1.15.0
-
cpe:2.3:a:posthog:posthog:1.15.1
-
cpe:2.3:a:posthog:posthog:1.16.0
-
cpe:2.3:a:posthog:posthog:1.17.0
-
cpe:2.3:a:posthog:posthog:1.18.0
-
cpe:2.3:a:posthog:posthog:1.19.0
-
cpe:2.3:a:posthog:posthog:1.2.0
-
cpe:2.3:a:posthog:posthog:1.20.0
-
cpe:2.3:a:posthog:posthog:1.21.0
-
cpe:2.3:a:posthog:posthog:1.22.0
-
cpe:2.3:a:posthog:posthog:1.23.0
-
cpe:2.3:a:posthog:posthog:1.23.1
-
cpe:2.3:a:posthog:posthog:1.24.0
-
cpe:2.3:a:posthog:posthog:1.25.0
-
cpe:2.3:a:posthog:posthog:1.26.0
-
cpe:2.3:a:posthog:posthog:1.27.0
-
cpe:2.3:a:posthog:posthog:1.28.0
-
cpe:2.3:a:posthog:posthog:1.28.1
-
cpe:2.3:a:posthog:posthog:1.29.0
-
cpe:2.3:a:posthog:posthog:1.29.1
-
cpe:2.3:a:posthog:posthog:1.3.0
-
cpe:2.3:a:posthog:posthog:1.30.0
-
cpe:2.3:a:posthog:posthog:1.31.0
-
cpe:2.3:a:posthog:posthog:1.31.1
-
cpe:2.3:a:posthog:posthog:1.32.0
-
cpe:2.3:a:posthog:posthog:1.33.0
-
cpe:2.3:a:posthog:posthog:1.34.0
-
cpe:2.3:a:posthog:posthog:1.34.1
-
cpe:2.3:a:posthog:posthog:1.34.2
-
cpe:2.3:a:posthog:posthog:1.35.0
-
cpe:2.3:a:posthog:posthog:1.36.0
-
cpe:2.3:a:posthog:posthog:1.36.1
-
cpe:2.3:a:posthog:posthog:1.37.0
-
cpe:2.3:a:posthog:posthog:1.37.1
-
cpe:2.3:a:posthog:posthog:1.38.0
-
cpe:2.3:a:posthog:posthog:1.38.1
-
cpe:2.3:a:posthog:posthog:1.39.0
-
cpe:2.3:a:posthog:posthog:1.39.1
-
cpe:2.3:a:posthog:posthog:1.4.0
-
cpe:2.3:a:posthog:posthog:1.40.0
-
cpe:2.3:a:posthog:posthog:1.40.1
-
cpe:2.3:a:posthog:posthog:1.41.0
-
cpe:2.3:a:posthog:posthog:1.41.1
-
cpe:2.3:a:posthog:posthog:1.41.2
-
cpe:2.3:a:posthog:posthog:1.41.3
-
cpe:2.3:a:posthog:posthog:1.41.4
-
cpe:2.3:a:posthog:posthog:1.42.0
-
cpe:2.3:a:posthog:posthog:1.43.0
-
cpe:2.3:a:posthog:posthog:1.43.1
-
cpe:2.3:a:posthog:posthog:1.5.0
-
cpe:2.3:a:posthog:posthog:1.6.0
-
cpe:2.3:a:posthog:posthog:1.7.0
-
cpe:2.3:a:posthog:posthog:1.8.0
-
cpe:2.3:a:posthog:posthog:1.9.0