PostHog-js is a library to interface with the PostHog analytics tool. Versions prior to 1.57.2 have the potential for cross-site scripting. Problem has been patched in 1.57.2. Users are advised to upgrade. Users unable to upgrade should ensure that their Content Security Policy is in place.
References
Configurations
History
03 Jun 2023, 03:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:posthog:posthog-js:*:*:*:*:*:*:*:* | |
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | (MISC) https://github.com/PostHog/posthog-js/commit/67e07eb8bb271a3a6f4aa251382e4d25abb385a0 - Patch | |
References | (MISC) https://github.com/PostHog/posthog-js/security/advisories/GHSA-8775-5hwv-wr6v - Vendor Advisory |
27 May 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-27 00:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-32325
Mitre link : CVE-2023-32325
CVE.ORG link : CVE-2023-32325
JSON object : View
Products Affected
posthog
- posthog-js
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')