๐Ÿ” CVE Alert

CVE-2026-30242

HIGH 8.5

Plane: SSRF via Incomplete IP Validation in Webhook URL Serializer

CVSS Score
8.5
EPSS Score
0.0%
EPSS Percentile
0th

Plane is an an open-source project management tool. Prior to version 1.2.3, the webhook URL validation in plane/app/serializers/webhook.py only checks ip.is_loopback, allowing attackers with workspace ADMIN role to create webhooks pointing to private/internal network addresses (10.x.x.x, 172.16.x.x, 192.168.x.x, 169.254.169.254, etc.). When webhook events fire, the server makes requests to these internal addresses and stores the response โ€” enabling SSRF with full response read-back. This issue has been patched in version 1.2.3.

CWE CWE-918
Vendor makeplane
Product plane
Published Mar 6, 2026
Last Updated Mar 9, 2026
Stay Ahead of the Next One

Get instant alerts for makeplane plane

Be the first to know when new high vulnerabilities affecting makeplane plane are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

makeplane / plane
< 1.2.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/makeplane/plane/security/advisories/GHSA-fpx8-73gf-7x73 github.com: https://github.com/makeplane/plane/releases/tag/v1.2.3