Plane is an an open-source project management tool. Prior to version 1.2.2, unauthenticated attackers can enumerate workspace members and extract sensitive information including email addresses, user roles, and internal identifiers. The vulnerability stems from Django REST Framework permission classes being incorrectly configured to allow anonymous access to protected endpoints. This issue has been patched in version 1.2.2.
References
| Link | Resource |
|---|---|
| https://github.com/makeplane/plane/releases/tag/v1.2.2 | Release Notes |
| https://github.com/makeplane/plane/security/advisories/GHSA-87x4-j8vh-p5qf | Vendor Advisory |
Configurations
History
10 Mar 2026, 16:23
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Plane plane
Plane |
|
| CPE | cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:* | |
| References | () https://github.com/makeplane/plane/releases/tag/v1.2.2 - Release Notes | |
| References | () https://github.com/makeplane/plane/security/advisories/GHSA-87x4-j8vh-p5qf - Vendor Advisory | |
| Summary |
|
06 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 22:16
Updated : 2026-03-10 16:23
NVD link : CVE-2026-30244
Mitre link : CVE-2026-30244
CVE.ORG link : CVE-2026-30244
JSON object : View
Products Affected
plane
- plane
