CVE-2025-62716: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane
Plane is open-source project management software. Prior to version 1.1.0, an open redirect vulnerability in the ?next_path query parameter allows attackers to supply arbitrary schemes (e.g., javascript:) that are passed directly to router.push. This results in a cross-site scripting (XSS) vulnerability, enabling attackers to execute arbitrary JavaScript in the victim’s browser. The issue can be exploited without authentication and has severe impact, including information disclosure, and privilege escalation and modifications of administrative settings. This issue has been patched in version 1.1.0.
AI Analysis
Technical Summary
CVE-2025-62716 is a cross-site scripting (XSS) vulnerability identified in the open-source project management software Plane, specifically in versions prior to 1.1.0. The root cause is an open redirect vulnerability in the ?next_path query parameter, which fails to properly sanitize input. This parameter accepts arbitrary URL schemes, including potentially dangerous ones like javascript:, which are then passed directly to the client-side router.push function. This improper neutralization of input during web page generation (CWE-79) allows attackers to craft URLs that, when visited by a user, execute arbitrary JavaScript code within the victim’s browser context. The vulnerability does not require authentication, increasing its risk profile, but does require user interaction such as clicking a malicious link. The impact includes the ability to disclose sensitive information accessible to the user, escalate privileges by manipulating session or application state, and modify administrative settings, potentially compromising the entire application environment. The vulnerability is compounded by the fact that it leverages an open redirect (CWE-601), which can facilitate phishing and social engineering attacks. The issue was publicly disclosed on October 24, 2025, and patched in Plane version 1.1.0. While no known exploits have been reported in the wild, the vulnerability’s high CVSS score of 8.1 reflects the ease of exploitation and the severity of potential impacts.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on the Plane project management software for critical workflows. Exploitation can lead to unauthorized access to sensitive project data, leakage of confidential information, and unauthorized administrative changes that could disrupt operations or lead to further compromise. The lack of authentication requirement means attackers can target any user, including those with elevated privileges, increasing the risk of privilege escalation. Given the collaborative nature of project management tools, a successful attack could propagate through organizational networks, affecting multiple departments. The vulnerability also facilitates phishing attacks by leveraging open redirects, increasing the likelihood of successful social engineering campaigns. Organizations in sectors such as finance, technology, and government, which often use project management tools extensively, may face heightened risks. Additionally, the potential for administrative setting modifications could undermine compliance with data protection regulations like GDPR, leading to legal and reputational consequences.
Mitigation Recommendations
European organizations should immediately upgrade all instances of Plane to version 1.1.0 or later, where the vulnerability has been patched. Until upgrades are complete, organizations should implement strict input validation and sanitization on the ?next_path parameter at the web application firewall (WAF) or reverse proxy level to block URLs containing suspicious schemes such as javascript:. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and untrusted sources, reducing the impact of potential XSS payloads. Conduct user awareness training to recognize and avoid phishing attempts that may exploit open redirects. Monitor web server and application logs for unusual redirect patterns or suspicious query parameters. Implement multi-factor authentication (MFA) for administrative accounts to mitigate privilege escalation risks. Regularly audit and review administrative settings and user privileges to detect unauthorized changes. Finally, maintain an incident response plan tailored to web application attacks to ensure rapid containment and remediation if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-62716: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane
Description
Plane is open-source project management software. Prior to version 1.1.0, an open redirect vulnerability in the ?next_path query parameter allows attackers to supply arbitrary schemes (e.g., javascript:) that are passed directly to router.push. This results in a cross-site scripting (XSS) vulnerability, enabling attackers to execute arbitrary JavaScript in the victim’s browser. The issue can be exploited without authentication and has severe impact, including information disclosure, and privilege escalation and modifications of administrative settings. This issue has been patched in version 1.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-62716 is a cross-site scripting (XSS) vulnerability identified in the open-source project management software Plane, specifically in versions prior to 1.1.0. The root cause is an open redirect vulnerability in the ?next_path query parameter, which fails to properly sanitize input. This parameter accepts arbitrary URL schemes, including potentially dangerous ones like javascript:, which are then passed directly to the client-side router.push function. This improper neutralization of input during web page generation (CWE-79) allows attackers to craft URLs that, when visited by a user, execute arbitrary JavaScript code within the victim’s browser context. The vulnerability does not require authentication, increasing its risk profile, but does require user interaction such as clicking a malicious link. The impact includes the ability to disclose sensitive information accessible to the user, escalate privileges by manipulating session or application state, and modify administrative settings, potentially compromising the entire application environment. The vulnerability is compounded by the fact that it leverages an open redirect (CWE-601), which can facilitate phishing and social engineering attacks. The issue was publicly disclosed on October 24, 2025, and patched in Plane version 1.1.0. While no known exploits have been reported in the wild, the vulnerability’s high CVSS score of 8.1 reflects the ease of exploitation and the severity of potential impacts.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on the Plane project management software for critical workflows. Exploitation can lead to unauthorized access to sensitive project data, leakage of confidential information, and unauthorized administrative changes that could disrupt operations or lead to further compromise. The lack of authentication requirement means attackers can target any user, including those with elevated privileges, increasing the risk of privilege escalation. Given the collaborative nature of project management tools, a successful attack could propagate through organizational networks, affecting multiple departments. The vulnerability also facilitates phishing attacks by leveraging open redirects, increasing the likelihood of successful social engineering campaigns. Organizations in sectors such as finance, technology, and government, which often use project management tools extensively, may face heightened risks. Additionally, the potential for administrative setting modifications could undermine compliance with data protection regulations like GDPR, leading to legal and reputational consequences.
Mitigation Recommendations
European organizations should immediately upgrade all instances of Plane to version 1.1.0 or later, where the vulnerability has been patched. Until upgrades are complete, organizations should implement strict input validation and sanitization on the ?next_path parameter at the web application firewall (WAF) or reverse proxy level to block URLs containing suspicious schemes such as javascript:. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and untrusted sources, reducing the impact of potential XSS payloads. Conduct user awareness training to recognize and avoid phishing attempts that may exploit open redirects. Monitor web server and application logs for unusual redirect patterns or suspicious query parameters. Implement multi-factor authentication (MFA) for administrative accounts to mitigate privilege escalation risks. Regularly audit and review administrative settings and user privileges to detect unauthorized changes. Finally, maintain an incident response plan tailored to web application attacks to ensure rapid containment and remediation if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-20T19:41:22.740Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fbdf95f816635ddaedfbd2
Added to database: 10/24/2025, 8:20:37 PM
Last enriched: 10/24/2025, 8:35:31 PM
Last updated: 10/30/2025, 1:54:22 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumCVE-2025-63608: n/a
HighRussian Hackers Exploit Adaptix Multi-Platform Pentesting Tool in Ransomware Attacks
HighCVE-2025-10317: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.Cart
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.