CVE-2025-55203
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-15

Last updated on: 2025-08-18

Assigner: GitHub, Inc.

Description
Plane is open-source project management software. Prior to version 0.28.0, a stored cross-site scripting (XSS) vulnerability exists in the description_html field of Plane. This flaw allows an attacker to inject malicious JavaScript code that is stored and later executed in other users’ browsers. The description_html field is not properly sanitized or escaped. An attacker can submit crafted JavaScript payloads that are saved in the application’s database. When another user views the affected content, the injected code executes in their browser, running in the application’s context and bypassing standard security protections. Successful exploitation can lead to session hijacking, theft of sensitive information, or forced redirection to malicious sites. The vulnerability can also be chained with CSRF attacks to perform unauthorized actions, or leveraged to distribute malware and exploit additional browser vulnerabilities. This issue has been patched in version 0.28.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-15
Last Modified
2025-08-18
Generated
2026-05-07
AI Q&A
2025-08-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
makeplane plane 0.27.1
makeplane plane 0.28.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) flaw in the Plane project management software prior to version 0.28.0. It occurs because the description_html field does not properly sanitize or escape user input, allowing attackers to inject malicious JavaScript code. This code is stored in the application's database and executed in other users' browsers when they view the affected content, running in the application's context and bypassing security protections.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to session hijacking, theft of sensitive information, forced redirection to malicious sites, unauthorized actions via CSRF attack chaining, distribution of malware, and exploitation of additional browser vulnerabilities.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Plane to version 0.28.0 or later, as this version contains the patch that fixes the stored cross-site scripting (XSS) vulnerability in the description_html field. Additionally, avoid using vulnerable versions prior to 0.28.0 to prevent exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart