Home

Description

Plane is open-source project management software. Prior to version 1.1.0, an open redirect vulnerability in the ?next_path query parameter allows attackers to supply arbitrary schemes (e.g., javascript:) that are passed directly to router.push. This results in a cross-site scripting (XSS) vulnerability, enabling attackers to execute arbitrary JavaScript in the victim’s browser. The issue can be exploited without authentication and has severe impact, including information disclosure, and privilege escalation and modifications of administrative settings. This issue has been patched in version 1.1.0.

PUBLISHED Reserved 2025-10-20 | Published 2025-10-24 | Updated 2025-10-24 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

< 1.1.0
affected

References

github.com/.../plane/security/advisories/GHSA-6fj7-xgpg-mj6f

cve.org (CVE-2025-62716)

nvd.nist.gov (CVE-2025-62716)

Download JSON