Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I also run Umami, but patched once the CVE patch was released. Also, I only expose the tracking js endpoint and /api/send via Caddy publically (though, /api/send might be enough to exploit the vul). To actually interact with Umami UI I use Twingate (similar to Tailscale) to tunnel into the VPC locally.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: