CVE-2026-39843

Plane is an an open-source project management tool. From 0.28.0 to before 1.3.0, the remediation of GHSA-jcc6-f9v6-f7jw is incomplete which could lead to the same full read Server-Side Request Forgery when a normal html page contains a link tag with an href that redirects to a private IP address is supplied to Add link by an authenticated attacker with low privileges. Redirects for the main page URL are validated, but not the favicon fetch path. fetch_and_encode_favicon() still uses requests.get(favicon_url, ...) with the default redirect-following. This vulnerability is fixed in 1.3.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:*

History

17 Apr 2026, 20:08

Type Values Removed Values Added
CPE cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:*
References () https://github.com/makeplane/plane/security/advisories/GHSA-9fr2-pprw-pp9j - () https://github.com/makeplane/plane/security/advisories/GHSA-9fr2-pprw-pp9j - Exploit, Vendor Advisory
First Time Plane plane
Plane

09 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 16:16

Updated : 2026-04-17 20:08


NVD link : CVE-2026-39843

Mitre link : CVE-2026-39843

CVE.ORG link : CVE-2026-39843


JSON object : View

Products Affected

plane

  • plane
CWE
CWE-918

Server-Side Request Forgery (SSRF)