Description
Plane is an an open-source project management tool. Prior to 1.3.0, a vulnerability was identified in Plane's authentication flow where a user's email address is included as a query parameter in the URL during error handling (e.g., when an invalid magic code is submitted). Transmitting personally identifiable information (PII) via GET request query strings is classified as an insecure design practice. The affected code path is located in the authentication utility module (packages/utils/src/auth.ts). This vulnerability is fixed in 1.3.0.
Published: 2026-04-07
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: PII Disclosure – User email exposed in URL query string
Action: Apply Patch
AI Analysis

Impact

A flaw in Plane’s authentication flow caused the user’s email address to be transmitted as a query parameter in the URL when error handling occurs, such as after an invalid magic code submission. This provides an attacker access to personal identifiers without requiring any credentials, thereby compromising user privacy. The weakness can be classified as a data exposure due to insecure design.

Affected Systems

The vulnerability resides in the open‑source project management tool Plane offered by makeplane. Versions of Plane prior to 1.3.0 are affected; the fix is implemented in release 1.3.0 and later. No other product or vendor variants are listed.

Risk and Exploitability

The CVSS score of 2 indicates low severity, and the EPSS score of less than 1% suggests a very low probability of exploitation. Kubernetes? (not applicable). The vulnerability is not present in the CISA KEV catalog. Based on the description, the likely attack vector involves a user following an error URL that contains the email in the query string; an attacker could capture this data by monitoring traffic or by manipulating the error handling mechanism. Exploitation does not require elevated privileges beyond intercepting traffic or inducing the error condition.

Generated by OpenCVE AI on April 14, 2026 at 20:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Plane to version 1.3.0 or later; verify the upgrade has removed the query parameter exposure.

Generated by OpenCVE AI on April 14, 2026 at 20:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Plane
Plane plane
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:*
Vendors & Products Plane
Plane plane

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Makeplane
Makeplane plane
Vendors & Products Makeplane
Makeplane plane

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Plane is an an open-source project management tool. Prior to 1.3.0, a vulnerability was identified in Plane's authentication flow where a user's email address is included as a query parameter in the URL during error handling (e.g., when an invalid magic code is submitted). Transmitting personally identifiable information (PII) via GET request query strings is classified as an insecure design practice. The affected code path is located in the authentication utility module (packages/utils/src/auth.ts). This vulnerability is fixed in 1.3.0.
Title Plane Exposes User Email (PII and part of credential) in GET Parameter
Weaknesses CWE-200
CWE-598
References
Metrics cvssV3_1

{'score': 2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T15:48:53.893Z

Reserved: 2026-02-25T03:11:36.690Z

Link: CVE-2026-27949

cve-icon Vulnrichment

Updated: 2026-04-08T15:48:49.572Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T21:17:15.400

Modified: 2026-04-14T18:44:46.493

Link: CVE-2026-27949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:15:11Z