CVE-2026-39843
Received Received - Intake
Server-Side Request Forgery in Plane Favicon Fetch (v

Publication date: 2026-04-09

Last updated on: 2026-04-17

Assigner: GitHub, Inc.

Description
Plane is an an open-source project management tool. From 0.28.0 to before 1.3.0, the remediation of GHSA-jcc6-f9v6-f7jw is incomplete which could lead to the same full read Server-Side Request Forgery when a normal html page contains a link tag with an href that redirects to a private IP address is supplied to Add link by an authenticated attacker with low privileges. Redirects for the main page URL are validated, but not the favicon fetch path. fetch_and_encode_favicon() still uses requests.get(favicon_url, ...) with the default redirect-following. This vulnerability is fixed in 1.3.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
plane plane From 0.28.0 (inc) to 1.3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-39843 is a Server-Side Request Forgery (SSRF) vulnerability in the open-source project management tool Plane, affecting versions from 0.28.0 up to but not including 1.3.0.

The vulnerability occurs because the application does not properly validate redirects when fetching the favicon URL specified in an HTML page's link tag. While redirects for the main page URL are checked, the favicon fetch path uses a function that follows redirects by default without validation.

An authenticated attacker with low privileges can supply an HTML page containing a link tag with a favicon URL that redirects to a private IP address. When this URL is added via the "Add link" feature, the server fetches the favicon, follows the redirect, and retrieves content from the internal network.

This fetched content is then base64-encoded and exposed in the favicon parameter of an API endpoint response, allowing the attacker to read internal network data.


How can this vulnerability impact me? :

This vulnerability allows an attacker with low privileges to perform a full read Server-Side Request Forgery (SSRF) attack.

By exploiting the vulnerability, the attacker can cause the server to fetch and expose data from internal or private network resources that are normally inaccessible from outside.

This can lead to unauthorized data disclosure and potential information leakage from internal systems.

The CVSS v3.1 base score is 7.7 (High), indicating a significant security risk with low attack complexity and no user interaction required.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to reproduce the Server-Side Request Forgery (SSRF) exploit as described in the proof of concept (PoC).

  • Host a publicly accessible HTML page containing a <link rel="icon" href="..."> tag where the href URL redirects to a private IP address.
  • Use the application's "Add link" feature to add the URL of this HTML page.
  • After some time, query the issues API endpoint, for example: curl -X GET "http://localhost/api/workspaces/[SLUG]/projects/[ID]/issues/[ID]/?expand=issue_reactions,issue_attachments,issue_link,parent"

If the response contains a base64-encoded favicon parameter with content fetched from the private IP, the vulnerability is present.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Plane application to version 1.3.0 or later, where this vulnerability has been fixed.

Until the upgrade can be performed, restrict access to the application to trusted users only, as exploitation requires authenticated low-privilege access.

Additionally, monitor and audit the URLs added via the "Add link" feature to detect any suspicious favicon URLs that may redirect to private IP addresses.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an attacker to perform a full read Server-Side Request Forgery (SSRF) attack, which can lead to unauthorized data exfiltration from internal networks.

Such unauthorized access and potential data leakage could impact compliance with data protection standards and regulations like GDPR and HIPAA, which require safeguarding sensitive and personal data against unauthorized access and breaches.

However, the provided information does not explicitly describe the direct effects on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart