<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Plane — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/plane/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 16:16:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/plane/feed.xml" rel="self" type="application/rss+xml"/><item><title>Plane Project Management Tool SSRF Vulnerability (CVE-2026-39843)</title><link>https://feed.craftedsignal.io/briefs/2026-04-plane-ssrf/</link><pubDate>Thu, 09 Apr 2026 16:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-plane-ssrf/</guid><description>Plane project management tool versions before 1.3.0 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated low-privilege attackers to read internal resources by exploiting the favicon fetch functionality.</description><content:encoded><![CDATA[<p>Plane is an open-source project management tool. Versions prior to 1.3.0 are vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, tracked as CVE-2026-39843. This vulnerability stems from an incomplete fix for GHSA-jcc6-f9v6-f7jw. An authenticated attacker with low privileges can exploit this vulnerability by supplying a crafted HTML page containing a <code>&lt;link&gt;</code> tag that redirects to a private IP address when using the &ldquo;Add link&rdquo; functionality. The vulnerability exists within the <code>fetch_and_encode_favicon()</code> function, which uses <code>requests.get(favicon_url, ...)</code> and follows redirects by default. This allows the attacker to force the server to make requests to internal resources. The vulnerability is resolved in version 1.3.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to a Plane instance with low-privilege credentials.</li>
<li>Attacker crafts a malicious HTML page containing a <code>&lt;link&gt;</code> tag in the <code>&lt;head&gt;</code> section. The <code>href</code> attribute of this tag points to a redirect URL.</li>
<li>The redirect URL points to a private IP address or internal service (e.g., <code>http://192.168.1.100/</code>).</li>
<li>The attacker uses the &ldquo;Add link&rdquo; functionality in Plane to add the crafted HTML page&rsquo;s URL to a project or task.</li>
<li>Plane&rsquo;s <code>fetch_and_encode_favicon()</code> function attempts to fetch the favicon from the supplied URL.</li>
<li>Due to the redirect in the malicious HTML page, the server-side request is redirected to the private IP address specified in the <code>href</code> attribute.</li>
<li>The server fetches content from the internal resource.</li>
<li>The attacker can view the response from the internal resource, potentially revealing sensitive information or allowing further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an authenticated, low-privilege attacker to read internal resources that the Plane server has access to. This could lead to the exposure of sensitive data, such as configuration files, internal API endpoints, or other confidential information. The number of potential victims is equal to the number of organizations using vulnerable versions of the Plane project management tool. The severity of the impact depends on the sensitivity of the information exposed and the attacker&rsquo;s ability to leverage the exposed information for further attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Plane to version 1.3.0 or later to patch CVE-2026-39843.</li>
<li>Monitor web server logs for requests originating from the Plane application to internal IP addresses, especially those in the private IP ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16). Use the Sigma rule <code>Detect Plane SSRF via Internal IP Request</code> to identify such requests.</li>
<li>Implement network segmentation and restrict the Plane server&rsquo;s access to only necessary internal resources.</li>
<li>Consider implementing additional input validation and sanitization measures to prevent the injection of malicious URLs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-39843</category><category>plane</category><category>project-management</category></item></channel></rss>