Impact
The vulnerability allows an authenticated workspace MEMBER to supply a crafted segment query parameter to the SavedAnalyticEndpoint which is directly fed into a Django F() expression. This enables ORM Field Reference Injection that can traverse foreign‑key relationships, exposing sensitive fields such as password hashes, API tokens, and email addresses to the user. The leak occurs through the JSON response and is more potent than prior order_by injection weaknesses, as it reveals actual field values.
Affected Systems
This issue affects makeplane:plane version 1.3.0 and all earlier releases of the Plane open‑source project management tool, where the SavedAnalyticEndpoint lacked validation against an allowlist. Version 1.3.1 and later contain the fix.
Risk and Exploitability
The CVSS base score of 6.5 classifies the weakness as moderate, while the EPSS score is not available and the vulnerability is not listed in CISA KEV. The likely attack vector requires authentication as a workspace MEMBER and involves a crafted GET request to the /api/workspaces/<slug>/saved-analytic-view/<analytic_id>/ endpoint. Because the attacker can read critical data, the risk to confidentiality is high for affected workspaces that host sensitive user information.
OpenCVE Enrichment