Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69284: CWE-284: Improper Access Control in makeplane plane

0
Medium
VulnerabilityCVE-2025-69284cvecve-2025-69284cwe-284
Published: Fri Jan 02 2026 (01/02/2026, 15:42:05 UTC)
Source: CVE Database V5
Vendor/Project: makeplane
Product: plane

Description

Plane is an an open-source project management tool. In plane.io, a guest user doesn't have a permission to access https[:]//app[.]plane[.]so/[:]slug/settings. Prior to Plane version 1.2.0, a problem occurs when the `/api/workspaces/:slug/members/` is accessible by guest and able to list of users on a specific workspace that they joined. Since the `display_name` in the response is actually the handler of the email, a malicious guest can still identify admin users' email addresses. Version 1.2.0 fixes this issue.

AI-Powered Analysis

AILast updated: 01/02/2026, 16:15:16 UTC

Technical Analysis

CVE-2025-69284 is an improper access control vulnerability (CWE-284) found in Plane, an open-source project management tool developed by makeplane. The flaw exists in versions prior to 1.2.0 where guest users, who normally have restricted permissions, can access the API endpoint /api/workspaces/:slug/members/. This endpoint returns a list of users in a specific workspace, including a display_name field. The display_name is derived from the email handler portion of users' email addresses, effectively leaking partial email information of workspace members, including administrative users. This leakage can be exploited by malicious guest users to identify and target privileged users for further attacks such as phishing or social engineering. The vulnerability does not allow modification or deletion of data, nor does it impact system availability. Exploitation requires the attacker to be a guest user in the workspace but does not require any additional user interaction. The issue was resolved in Plane version 1.2.0 by restricting guest access to this API endpoint, thereby preventing unauthorized enumeration of workspace members. No known exploits are currently in the wild, and the CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to limited confidentiality impact and ease of exploitation within the guest user scope.

Potential Impact

For European organizations using Plane versions prior to 1.2.0, this vulnerability poses a risk of partial confidentiality loss. The exposure of email handlers of workspace members, including administrators, can facilitate targeted phishing campaigns or social engineering attacks, which are common initial vectors for more severe intrusions. While the vulnerability does not allow direct modification or disruption of data, the information disclosure can undermine organizational security by enabling attackers to identify high-value targets. This is particularly concerning for organizations handling sensitive projects or intellectual property within Plane. The impact is more pronounced in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government entities in Europe. Additionally, the breach of user privacy could lead to compliance issues under GDPR if email information is considered personal data. However, since exploitation requires guest access to the workspace, the threat is somewhat mitigated by internal access controls and user onboarding policies.

Mitigation Recommendations

European organizations should immediately upgrade all Plane instances to version 1.2.0 or later to remediate this vulnerability. Until the upgrade is applied, administrators should review and restrict guest user permissions rigorously, ensuring that only trusted users are granted guest access. Implement network segmentation and access controls to limit exposure of the Plane application to only necessary users. Monitor API access logs for unusual guest activity or repeated access attempts to the /api/workspaces/:slug/members/ endpoint. Educate workspace members, especially administrators, about phishing risks and encourage the use of multifactor authentication to mitigate the impact of potential email enumeration. Additionally, consider implementing email address obfuscation or aliasing where possible to reduce the risk of direct email exposure. Regularly audit user roles and permissions within Plane to ensure least privilege principles are enforced.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-31T16:35:37.772Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6957eb35db813ff03ef355a3

Added to database: 1/2/2026, 3:58:45 PM

Last enriched: 1/2/2026, 4:15:16 PM

Last updated: 1/8/2026, 7:21:01 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats