Description
Plane is an an open-source project management tool. Prior to version 1.2.2, a Full Read Server-Side Request Forgery (SSRF) vulnerability has been identified in the "Add Link" feature. This flaw allows an authenticated attacker with general user privileges to send arbitrary GET requests to the internal network and exfiltrate the full response body. By exploiting this vulnerability, an attacker can steal sensitive data from internal services and cloud metadata endpoints. Version 1.2.2 fixes the issue.
Published: 2026-02-25
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Full Read Server‑Side Request Forgery (SSRF)
Action: Immediate Patch
AI Analysis

Impact

An authenticated user with general privileges can add a link in Plane’s "Add Link" feature, prompting the server to fetch arbitrary URLs. The fetched response body is returned to the attacker, allowing the acquisition of internal network data, cloud metadata, or other sensitive resources. The flaw does not provide code execution or privilege escalation, but exposes confidential information and can be used to map internal services.

Affected Systems

The vulnerability affects the Plane project management tool from makeplane. All installations running a version older than 1.2.2 are impacted; version 1.2.2 and later include the fix.

Risk and Exploitability

The CVSS score of 7.7 indicates high risk, while the EPSS score of less than 1% suggests that current exploitation activity is low, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be a web-based SSRF performed by an authenticated user; no additional privilege escalation is required.

Generated by OpenCVE AI on April 18, 2026 at 10:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Plane to version 1.2.2 or later, which removes the SSRF flaw.
  • If an immediate upgrade is not possible, restrict the "Add Link" feature to administrators or disable it entirely for standard users.
  • Implement network segmentation or firewall rules to block outbound requests from the Plane application to internal or cloud metadata endpoints.

Generated by OpenCVE AI on April 18, 2026 at 10:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Plane
Plane plane
CPEs cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:*
Vendors & Products Plane
Plane plane

Fri, 27 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Makeplane
Makeplane plane
Vendors & Products Makeplane
Makeplane plane

Wed, 25 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
Description Plane is an an open-source project management tool. Prior to version 1.2.2, a Full Read Server-Side Request Forgery (SSRF) vulnerability has been identified in the "Add Link" feature. This flaw allows an authenticated attacker with general user privileges to send arbitrary GET requests to the internal network and exfiltrate the full response body. By exploiting this vulnerability, an attacker can steal sensitive data from internal services and cloud metadata endpoints. Version 1.2.2 fixes the issue.
Title Plane Vulnerable to Full Read SSRF via Favicon Fetching in "Add Link" Feature
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-25T20:13:05.310Z

Reserved: 2026-02-23T17:56:51.202Z

Link: CVE-2026-27706

cve-icon Vulnrichment

Updated: 2026-02-25T20:12:53.756Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T17:25:39.740

Modified: 2026-02-27T17:36:19.910

Link: CVE-2026-27706

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:45:43Z

Weaknesses