CVE-2026-27705
Received Received - Intake
Insecure Direct Object Reference in Plane ProjectAssetEndpoint Allows Unauthorized Asset Modification

Publication date: 2026-02-25

Last updated on: 2026-02-27

Assigner: GitHub, Inc.

Description
Plane is an an open-source project management tool. Prior to version 1.2.2, the `ProjectAssetEndpoint.patch()` method in `apps/api/plane/app/views/asset/v2.py` (lines 579–593) performs a global asset lookup using only the asset ID (`pk`) via `FileAsset.objects.get(id=pk)`, without verifying that the asset belongs to the workspace and project specified in the URL path. This allows any authenticated user (including those with the GUEST role) to modify the `attributes` and `is_uploaded` status of assets belonging to any workspace or project in the entire Plane instance by guessing or enumerating asset UUIDs. Version 1.2.2 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-25
Last Modified
2026-02-27
Generated
2026-05-06
AI Q&A
2026-02-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
plane plane to 1.2.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-27705 is an Insecure Direct Object Reference (IDOR) vulnerability in the Plane project management tool affecting versions prior to 1.2.2.

The vulnerability exists in the `ProjectAssetEndpoint.patch()` method, which performs a global asset lookup using only the asset ID without verifying that the asset belongs to the workspace and project specified in the URL path.

This lack of authorization check allows any authenticated user, including those with the GUEST role, to modify the attributes and upload status of assets belonging to any workspace or project by guessing or enumerating asset UUIDs.

This leads to cross-workspace and cross-project asset modification, violating multi-tenant isolation.


How can this vulnerability impact me? :

The vulnerability allows unauthorized users to modify asset metadata and upload status across all workspaces and projects within a Plane instance.

  • Unauthorized modification of asset metadata stored in the `attributes` JSON field, which can cause broken file downloads, incorrect file-type rendering, and disrupt document workflows.
  • Unconditional setting of the `is_uploaded` flag to true, potentially marking incomplete uploads as complete.
  • Authorization boundary violation allowing GUEST users in one workspace to affect assets in other workspaces.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves unauthorized modification of assets by guessing or enumerating asset UUIDs due to insufficient authorization checks in the patch method. Detection would involve monitoring for unusual or unauthorized PATCH requests to the asset endpoint that modify asset attributes or the is_uploaded status.'}, {'type': 'paragraph', 'content': 'Specifically, you can look for PATCH HTTP requests to URLs matching the asset update endpoint pattern that include asset IDs, and verify if these requests are coming from users with GUEST or low privilege roles.'}, {'type': 'paragraph', 'content': 'Commands to detect such activity might include using web server logs or API gateway logs to filter PATCH requests to the asset endpoint, for example using grep or similar tools:'}, {'type': 'list_item', 'content': "grep 'PATCH /api/plane/app/views/asset/v2/' /var/log/nginx/access.log | grep -i 'application/json'"}, {'type': 'list_item', 'content': 'Analyze logs for PATCH requests modifying asset attributes or is_uploaded fields from unexpected users or IP addresses.'}, {'type': 'paragraph', 'content': 'Additionally, you can audit database changes to the FileAsset table to detect modifications to attributes or is_uploaded fields that do not correspond to authorized users or projects.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The immediate mitigation step is to upgrade the Plane package to version 1.2.2 or later, where the vulnerability has been fixed by adding proper authorization checks to ensure asset modifications are scoped to the correct workspace and project.'}, {'type': 'paragraph', 'content': 'If upgrading immediately is not possible, restrict access to the asset patch endpoint to trusted users only, and monitor for suspicious PATCH requests that attempt to modify assets across workspaces or projects.'}, {'type': 'paragraph', 'content': "Implement additional access controls or API gateway rules to validate that asset modification requests include correct workspace and project identifiers matching the authenticated user's permissions."}, {'type': 'paragraph', 'content': 'Review and audit user roles and permissions, especially for GUEST users, to limit their ability to perform asset modifications until the patch is applied.'}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart