Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62716: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane

0
High
VulnerabilityCVE-2025-62716cvecve-2025-62716cwe-79cwe-601
Published: Fri Oct 24 2025 (10/24/2025, 20:06:18 UTC)
Source: CVE Database V5
Vendor/Project: makeplane
Product: plane

Description

Plane is open-source project management software. Prior to version 1.1.0, an open redirect vulnerability in the ?next_path query parameter allows attackers to supply arbitrary schemes (e.g., javascript:) that are passed directly to router.push. This results in a cross-site scripting (XSS) vulnerability, enabling attackers to execute arbitrary JavaScript in the victim’s browser. The issue can be exploited without authentication and has severe impact, including information disclosure, and privilege escalation and modifications of administrative settings. This issue has been patched in version 1.1.0.

AI-Powered Analysis

AILast updated: 10/24/2025, 20:35:31 UTC

Technical Analysis

CVE-2025-62716 is a cross-site scripting (XSS) vulnerability identified in the open-source project management software Plane, specifically in versions prior to 1.1.0. The root cause is an open redirect vulnerability in the ?next_path query parameter, which fails to properly sanitize input. This parameter accepts arbitrary URL schemes, including potentially dangerous ones like javascript:, which are then passed directly to the client-side router.push function. This improper neutralization of input during web page generation (CWE-79) allows attackers to craft URLs that, when visited by a user, execute arbitrary JavaScript code within the victim’s browser context. The vulnerability does not require authentication, increasing its risk profile, but does require user interaction such as clicking a malicious link. The impact includes the ability to disclose sensitive information accessible to the user, escalate privileges by manipulating session or application state, and modify administrative settings, potentially compromising the entire application environment. The vulnerability is compounded by the fact that it leverages an open redirect (CWE-601), which can facilitate phishing and social engineering attacks. The issue was publicly disclosed on October 24, 2025, and patched in Plane version 1.1.0. While no known exploits have been reported in the wild, the vulnerability’s high CVSS score of 8.1 reflects the ease of exploitation and the severity of potential impacts.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on the Plane project management software for critical workflows. Exploitation can lead to unauthorized access to sensitive project data, leakage of confidential information, and unauthorized administrative changes that could disrupt operations or lead to further compromise. The lack of authentication requirement means attackers can target any user, including those with elevated privileges, increasing the risk of privilege escalation. Given the collaborative nature of project management tools, a successful attack could propagate through organizational networks, affecting multiple departments. The vulnerability also facilitates phishing attacks by leveraging open redirects, increasing the likelihood of successful social engineering campaigns. Organizations in sectors such as finance, technology, and government, which often use project management tools extensively, may face heightened risks. Additionally, the potential for administrative setting modifications could undermine compliance with data protection regulations like GDPR, leading to legal and reputational consequences.

Mitigation Recommendations

European organizations should immediately upgrade all instances of Plane to version 1.1.0 or later, where the vulnerability has been patched. Until upgrades are complete, organizations should implement strict input validation and sanitization on the ?next_path parameter at the web application firewall (WAF) or reverse proxy level to block URLs containing suspicious schemes such as javascript:. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and untrusted sources, reducing the impact of potential XSS payloads. Conduct user awareness training to recognize and avoid phishing attempts that may exploit open redirects. Monitor web server and application logs for unusual redirect patterns or suspicious query parameters. Implement multi-factor authentication (MFA) for administrative accounts to mitigate privilege escalation risks. Regularly audit and review administrative settings and user privileges to detect unauthorized changes. Finally, maintain an incident response plan tailored to web application attacks to ensure rapid containment and remediation if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-20T19:41:22.740Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fbdf95f816635ddaedfbd2

Added to database: 10/24/2025, 8:20:37 PM

Last enriched: 10/24/2025, 8:35:31 PM

Last updated: 10/30/2025, 1:54:22 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats