Home

Description

Plane is an an open-source project management tool. Prior to version 1.2.3, the webhook URL validation in plane/app/serializers/webhook.py only checks ip.is_loopback, allowing attackers with workspace ADMIN role to create webhooks pointing to private/internal network addresses (10.x.x.x, 172.16.x.x, 192.168.x.x, 169.254.169.254, etc.). When webhook events fire, the server makes requests to these internal addresses and stores the response — enabling SSRF with full response read-back. This issue has been patched in version 1.2.3.

PUBLISHED Reserved 2026-03-04 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




HIGH: 8.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 1.2.3
affected

References

github.com/.../plane/security/advisories/GHSA-fpx8-73gf-7x73

github.com/makeplane/plane/releases/tag/v1.2.3

cve.org (CVE-2026-30242)

nvd.nist.gov (CVE-2026-30242)

Download JSON