Home

Description

Plane is an an open-source project management tool. Prior to version 1.2.2, unauthenticated attackers can enumerate workspace members and extract sensitive information including email addresses, user roles, and internal identifiers. The vulnerability stems from Django REST Framework permission classes being incorrectly configured to allow anonymous access to protected endpoints. This issue has been patched in version 1.2.2.

PUBLISHED Reserved 2026-03-04 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-284: Improper Access Control

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 1.2.2
affected

References

github.com/.../plane/security/advisories/GHSA-87x4-j8vh-p5qf

github.com/makeplane/plane/releases/tag/v1.2.2

cve.org (CVE-2026-30244)

nvd.nist.gov (CVE-2026-30244)

Download JSON