Plane is an an open-source project management tool. From 0.28.0 to before 1.3.0, the remediation of GHSA-jcc6-f9v6-f7jw is incomplete which could lead to the same full read Server-Side Request Forgery when a normal html page contains a link tag with an href that redirects to a private IP address is supplied to Add link by an authenticated attacker with low privileges. Redirects for the main page URL are validated, but not the favicon fetch path. fetch_and_encode_favicon() still uses requests.get(favicon_url, ...) with the default redirect-following. This vulnerability is fixed in 1.3.0.
References
| Link | Resource |
|---|---|
| https://github.com/makeplane/plane/security/advisories/GHSA-9fr2-pprw-pp9j | Exploit Vendor Advisory |
Configurations
History
17 Apr 2026, 20:08
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:* | |
| References | () https://github.com/makeplane/plane/security/advisories/GHSA-9fr2-pprw-pp9j - Exploit, Vendor Advisory | |
| First Time |
Plane plane
Plane |
09 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 16:16
Updated : 2026-04-17 20:08
NVD link : CVE-2026-39843
Mitre link : CVE-2026-39843
CVE.ORG link : CVE-2026-39843
JSON object : View
Products Affected
plane
- plane
CWE
CWE-918
Server-Side Request Forgery (SSRF)
