Home

Description

Plane is an open-source project management tool. In versions 1.3.0 and below, SavedAnalyticEndpoint passes the user-controlled segment query parameter directly to a Django F() expression without validation (unlike the regular AnalyticsEndpoint, which checks against an allowlist), causing ORM Field Reference Injection. An authenticated workspace MEMBER can send GET /api/workspaces/<slug>/saved-analytic-view/<analytic_id>/ with a crafted segment value that is forwarded into build_graph_plot() and traverses foreign-key relationships (e.g. workspace__owner__password) before being projected via .values("dimension", "segment"), returning the referenced field values directly in the JSON response. This exposes sensitive data such as bcrypt password hashes, API tokens, and related users' email addresses, making it a stronger primitive than the related order_by injection where values are only leaked through ordering. This issue has been fixed in version 1.3.1.

PUBLISHED Reserved 2026-04-09 | Published 2026-05-20 | Updated 2026-05-20 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-943: Improper Neutralization of Special Elements in Data Query Logic

Product status

< 1.3.1
affected

References

github.com/.../plane/security/advisories/GHSA-93x3-ghh7-72j3

github.com/makeplane/plane/releases/tag/v1.3.1

cve.org (CVE-2026-40102)

nvd.nist.gov (CVE-2026-40102)

Download JSON