Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30242: CWE-918: Server-Side Request Forgery (SSRF) in makeplane plane

0
High
VulnerabilityCVE-2026-30242cvecve-2026-30242cwe-918
Published: Fri Mar 06 2026 (03/06/2026, 21:19:24 UTC)
Source: CVE Database V5
Vendor/Project: makeplane
Product: plane

Description

Plane is an an open-source project management tool. Prior to version 1.2.3, the webhook URL validation in plane/app/serializers/webhook.py only checks ip.is_loopback, allowing attackers with workspace ADMIN role to create webhooks pointing to private/internal network addresses (10.x.x.x, 172.16.x.x, 192.168.x.x, 169.254.169.254, etc.). When webhook events fire, the server makes requests to these internal addresses and stores the response — enabling SSRF with full response read-back. This issue has been patched in version 1.2.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:44:03 UTC

Technical Analysis

CVE-2026-30242 is a Server-Side Request Forgery (SSRF) vulnerability identified in the open-source project management tool Plane, specifically in versions prior to 1.2.3. The vulnerability stems from inadequate validation of webhook URLs in the file plane/app/serializers/webhook.py, where the validation logic only checks if the IP address is a loopback address (e.g., 127.0.0.1) but fails to block private or link-local IP ranges such as 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, and the special metadata IP 169.254.169.254. Attackers possessing workspace ADMIN privileges can exploit this by creating malicious webhooks that point to internal network resources. When webhook events are triggered, the Plane server performs HTTP requests to these internal addresses and stores the full response content. This behavior allows an attacker to perform SSRF attacks with full response read-back capability, potentially exposing sensitive internal services, configuration data, or cloud instance metadata that could lead to further compromise. The vulnerability does not require user interaction beyond webhook creation but does require authenticated ADMIN access, limiting the attack surface to privileged users. The issue was addressed in Plane version 1.2.3 by improving URL validation to block private and link-local IP addresses. The CVSS v3.1 base score is 8.5, reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and causing high confidentiality impact with limited integrity impact and no availability impact. No known exploits in the wild have been reported as of the publication date.

Potential Impact

The primary impact of CVE-2026-30242 is the unauthorized disclosure of sensitive internal information due to SSRF attacks. Attackers with ADMIN privileges can leverage this vulnerability to access internal network resources that are normally inaccessible from outside the Plane server, including private IP ranges and cloud metadata services. This can lead to exposure of sensitive configuration data, internal APIs, or credentials stored in metadata endpoints, potentially enabling lateral movement, privilege escalation, or further compromise of the organization's infrastructure. The confidentiality impact is high because attackers can read full HTTP responses from internal systems. Integrity impact is limited because the vulnerability does not allow modifying internal resources directly, and availability impact is negligible. Organizations using Plane in environments with sensitive internal services or cloud infrastructure are at significant risk. The requirement for ADMIN privileges reduces the risk from external unauthenticated attackers but elevates the threat from insider attackers or compromised admin accounts. Failure to patch could result in data breaches, compliance violations, and operational risks.

Mitigation Recommendations

1. Upgrade Plane to version 1.2.3 or later immediately to apply the official patch that properly validates webhook URLs and blocks private/internal IP addresses. 2. Audit existing webhook configurations to identify and remove any webhooks pointing to internal or private IP addresses. 3. Implement strict role-based access controls (RBAC) to limit ADMIN privileges only to trusted personnel and monitor for suspicious ADMIN activities. 4. Employ network segmentation and firewall rules to restrict the Plane server’s ability to initiate HTTP requests to sensitive internal IP ranges, minimizing the SSRF attack surface. 5. Monitor logs for unusual outbound HTTP requests from the Plane server, especially to internal IP addresses or metadata endpoints. 6. Consider deploying Web Application Firewalls (WAFs) with SSRF detection capabilities to detect and block malicious webhook-triggered requests. 7. Educate administrators about the risks of SSRF and the importance of validating webhook endpoints before creation. 8. If possible, disable webhook functionality temporarily until the patch is applied and configurations are verified.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T17:23:59.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ab479ac48b3f10ffdbff8f

Added to database: 3/6/2026, 9:31:06 PM

Last enriched: 3/14/2026, 7:44:03 PM

Last updated: 4/20/2026, 4:18:56 AM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses