Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30244: CWE-284: Improper Access Control in makeplane plane

0
High
VulnerabilityCVE-2026-30244cvecve-2026-30244cwe-284cwe-200
Published: Fri Mar 06 2026 (03/06/2026, 21:19:12 UTC)
Source: CVE Database V5
Vendor/Project: makeplane
Product: plane

Description

Plane is an an open-source project management tool. Prior to version 1.2.2, unauthenticated attackers can enumerate workspace members and extract sensitive information including email addresses, user roles, and internal identifiers. The vulnerability stems from Django REST Framework permission classes being incorrectly configured to allow anonymous access to protected endpoints. This issue has been patched in version 1.2.2.

AI-Powered Analysis

AILast updated: 03/06/2026, 21:45:19 UTC

Technical Analysis

CVE-2026-30244 is an access control vulnerability classified under CWE-284 and CWE-200 affecting the Plane project management tool developed by makeplane. The vulnerability arises from incorrect configuration of permission classes in the Django REST Framework, which is used by Plane to expose its API endpoints. Specifically, endpoints that provide workspace member information were left accessible to anonymous users, allowing unauthenticated attackers to enumerate all members within a workspace. This enumeration exposes sensitive data including email addresses, user roles, and internal identifiers that could be leveraged for further social engineering, phishing, or targeted attacks. The vulnerability affects all versions of Plane prior to 1.2.2 and is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and the confidentiality impact. The flaw does not impact data integrity or availability, and no known exploits have been reported in the wild as of the publication date. The issue was addressed by correcting the permission classes to enforce proper access control in version 1.2.2.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive user information, which compromises confidentiality. Exposure of email addresses and user roles can facilitate targeted phishing campaigns, spear-phishing, or social engineering attacks against workspace members. Internal identifiers could also aid attackers in crafting more sophisticated attacks or in mapping organizational structures. While the vulnerability does not directly affect system integrity or availability, the leaked information can be a stepping stone for further attacks that may lead to privilege escalation or data breaches. Organizations relying on Plane for project management risk reputational damage, loss of user trust, and potential compliance violations related to data privacy. The ease of exploitation without authentication or user interaction increases the likelihood of automated scanning and mass enumeration attacks, especially if the affected service is internet-facing.

Mitigation Recommendations

The definitive mitigation is to upgrade all affected Plane instances to version 1.2.2 or later, where the permission misconfiguration has been corrected. Until upgrade is possible, organizations should restrict external access to the Plane API endpoints through network controls such as firewalls or VPNs to limit exposure to unauthenticated users. Implementing Web Application Firewalls (WAFs) with rules to detect and block enumeration patterns can provide additional protection. Administrators should audit API permissions and review access control configurations to ensure no other endpoints are inadvertently exposed. Monitoring logs for unusual access patterns or enumeration attempts can help detect exploitation attempts early. Finally, educating users about phishing risks and enforcing strong email security controls can mitigate the impact of any information disclosure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T17:23:59.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ab479ac48b3f10ffdbff93

Added to database: 3/6/2026, 9:31:06 PM

Last enriched: 3/6/2026, 9:45:19 PM

Last updated: 3/6/2026, 11:58:08 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses