CVE-2026-27706
Full SSRF Vulnerability in Plane Project Management Tool Allows Data Exfiltration
Publication date: 2026-02-25
Last updated on: 2026-02-27
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| plane | plane | to 1.2.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-27706 is a Server-Side Request Forgery (SSRF) vulnerability found in the "Add Link" feature of the open-source project management tool Plane, prior to version 1.2.2.'}, {'type': 'paragraph', 'content': 'This flaw allows an authenticated user with general privileges to make the server send arbitrary HTTP GET requests to internal network resources without proper validation.'}, {'type': 'paragraph', 'content': 'As a result, the attacker can retrieve the full response body from these internal requests, potentially accessing sensitive data from internal services and cloud metadata endpoints.'}, {'type': 'paragraph', 'content': 'The vulnerability occurs because the server does not properly validate the destination URLs during favicon fetching, allowing requests to unintended internal targets.'}, {'type': 'paragraph', 'content': 'This issue was fixed in Plane version 1.2.2 by implementing strict URL validation and controls on outbound requests.'}] [2, 1]
How can this vulnerability impact me? :
Exploiting this SSRF vulnerability can allow an attacker to steal sensitive data from internal services and cloud metadata endpoints, which may include instance credentials and IAM roles.
Attackers can also perform internal network reconnaissance by identifying host and port statuses within isolated environments.
This can lead to unauthorized access to internal APIs or unauthenticated services such as object storage.
Overall, the vulnerability poses a high confidentiality risk, potentially exposing critical internal information and credentials.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unusual outbound HTTP GET requests originating from the server, especially those targeting internal network resources or cloud metadata endpoints. Since the flaw allows an authenticated user to trigger arbitrary GET requests via the "Add Link" feature, suspicious logs or network traffic involving unexpected internal URLs may indicate exploitation attempts.'}, {'type': 'paragraph', 'content': 'Commands to help detect this may include inspecting server logs for unusual URL fetches or using network monitoring tools to capture outbound HTTP requests from the application server.'}, {'type': 'list_item', 'content': 'Use grep or similar tools to search application logs for outbound requests to internal IP ranges or metadata endpoints, e.g., `grep -r "http://169.254.169.254" /var/log/plane/`'}, {'type': 'list_item', 'content': 'Use network monitoring tools like tcpdump or Wireshark to capture outbound HTTP traffic from the server, e.g., `tcpdump -i eth0 tcp port 80 and src host <server-ip>`'}, {'type': 'list_item', 'content': 'Check for unusual or unexpected GET requests in web server or application logs that correspond to the "Add Link" feature usage.'}] [2]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'The immediate and most effective mitigation is to upgrade the makeplane/plane application to version 1.2.2 or later, which contains the security patch fixing this SSRF vulnerability.'}, {'type': 'paragraph', 'content': 'Until the upgrade can be applied, consider restricting access to the "Add Link" feature to only trusted users, and implement network-level controls to limit the server\'s ability to make outbound HTTP requests to internal or sensitive endpoints.'}, {'type': 'paragraph', 'content': 'Additionally, review and harden server-side URL validation and outbound request controls if possible, to prevent arbitrary requests.'}] [1, 2]