Plane

8 CVEs product

Monthly

CVE-2026-39843 HIGH This Week

Server-Side Request Forgery (SSRF) in Makeplane Plane (versions 0.28.0 to before 1.3.0) allows authenticated attackers with low privileges to perform full-read SSRF attacks against internal network resources. The vulnerability exists because incomplete remediation of a previous SSRF issue (GHSA-jcc6-f9v6-f7jw) left the favicon fetch path vulnerable to redirect-based attacks. When an attacker supplies an HTML page containing a link tag with an href redirecting to a private IP address via the 'Add link' feature, the fetch_and_encode_favicon() function follows redirects without validation, enabling unauthorized access to internal resources. Requires authenticated access; no public exploit identified at time of analysis.

SSRF Plane
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-30244 HIGH This Week

Unauthenticated attackers can enumerate workspace members and harvest sensitive information including email addresses, user roles, and internal identifiers from Plane prior to version 1.2.2 due to misconfigured Django REST Framework permissions. The vulnerability requires no authentication or user interaction and allows remote attackers to directly access protected endpoints over the network. No patch is currently available for affected Golang and Django deployments.

Golang Django Plane
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-30242 HIGH PATCH This Week

Plane is an an open-source project management tool. [CVSS 8.5 HIGH]

SSRF Plane
NVD GitHub
CVSS 3.1
8.5
EPSS
0.0%
CVE-2026-27706 HIGH This Week

Plane versions before 1.2.2 contain a server-side request forgery vulnerability in the "Add Link" feature that allows authenticated users to send arbitrary GET requests to internal networks and retrieve full response bodies. An attacker with basic user privileges can exploit this to steal sensitive data from internal services and cloud metadata endpoints. No patch is currently available.

SSRF Plane
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-27705 MEDIUM PATCH This Month

Plane prior to version 1.2.2 allows authenticated users to modify project assets across any workspace by directly referencing asset IDs, as the asset lookup fails to verify workspace and project ownership. An attacker with guest-level credentials can enumerate asset UUIDs and alter asset attributes and upload status without authorization. The vulnerability has been patched in version 1.2.2.

Authentication Bypass Plane
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-69284 MEDIUM This Month

Plane is an an open-source project management tool. In plane.io, a guest user doesn't have a permission to access https[:]//app[.]plane[.]so/[:]slug/settings. [CVSS 4.3 MEDIUM]

Authentication Bypass Plane
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-48070 LOW POC PATCH Monitor

Plane is open-source project management software. Rated low severity (CVSS 3.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Privilege Escalation XSS Plane
NVD GitHub
CVSS 3.1
3.5
EPSS
0.1%
CVE-2025-21616 MEDIUM POC This Month

Plane is an open-source project management tool. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Plane
NVD GitHub
CVSS 3.1
5.4
EPSS
0.7%
CVE-2026-39843
EPSS 0% CVSS 7.7
HIGH This Week

Server-Side Request Forgery (SSRF) in Makeplane Plane (versions 0.28.0 to before 1.3.0) allows authenticated attackers with low privileges to perform full-read SSRF attacks against internal network resources. The vulnerability exists because incomplete remediation of a previous SSRF issue (GHSA-jcc6-f9v6-f7jw) left the favicon fetch path vulnerable to redirect-based attacks. When an attacker supplies an HTML page containing a link tag with an href redirecting to a private IP address via the 'Add link' feature, the fetch_and_encode_favicon() function follows redirects without validation, enabling unauthorized access to internal resources. Requires authenticated access; no public exploit identified at time of analysis.

SSRF Plane
NVD GitHub
CVE-2026-30244
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can enumerate workspace members and harvest sensitive information including email addresses, user roles, and internal identifiers from Plane prior to version 1.2.2 due to misconfigured Django REST Framework permissions. The vulnerability requires no authentication or user interaction and allows remote attackers to directly access protected endpoints over the network. No patch is currently available for affected Golang and Django deployments.

Golang Django Plane
NVD GitHub
CVE-2026-30242
EPSS 0% CVSS 8.5
HIGH PATCH This Week

Plane is an an open-source project management tool. [CVSS 8.5 HIGH]

SSRF Plane
NVD GitHub
CVE-2026-27706
EPSS 0% CVSS 7.7
HIGH This Week

Plane versions before 1.2.2 contain a server-side request forgery vulnerability in the "Add Link" feature that allows authenticated users to send arbitrary GET requests to internal networks and retrieve full response bodies. An attacker with basic user privileges can exploit this to steal sensitive data from internal services and cloud metadata endpoints. No patch is currently available.

SSRF Plane
NVD GitHub
CVE-2026-27705
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Plane prior to version 1.2.2 allows authenticated users to modify project assets across any workspace by directly referencing asset IDs, as the asset lookup fails to verify workspace and project ownership. An attacker with guest-level credentials can enumerate asset UUIDs and alter asset attributes and upload status without authorization. The vulnerability has been patched in version 1.2.2.

Authentication Bypass Plane
NVD GitHub
CVE-2025-69284
EPSS 0% CVSS 4.3
MEDIUM This Month

Plane is an an open-source project management tool. In plane.io, a guest user doesn't have a permission to access https[:]//app[.]plane[.]so/[:]slug/settings. [CVSS 4.3 MEDIUM]

Authentication Bypass Plane
NVD GitHub
CVE-2025-48070
EPSS 0% CVSS 3.5
LOW POC PATCH Monitor

Plane is open-source project management software. Rated low severity (CVSS 3.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Privilege Escalation XSS Plane
NVD GitHub
CVE-2025-21616
EPSS 1% CVSS 5.4
MEDIUM POC This Month

Plane is an open-source project management tool. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Plane
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy