PT-2026-21941 · Plane · Plane
Q1Uf3Ng
·
Published
2026-02-25
·
Updated
2026-03-25
·
CVE-2026-27705
CVSS v3.1
6.5
Medium
| AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
Name of the Vulnerable Software and Affected Versions
Plane versions prior to 1.2.2
Description
Plane is an open-source project management tool. The
ProjectAssetEndpoint.patch() method in apps/api/plane/app/views/asset/v2.py (lines 579–593) performs a global asset lookup using only the asset ID (pk) via FileAsset.objects.get(id=pk), without verifying that the asset belongs to the workspace and project specified in the URL path. This allows any authenticated user, including those with the GUEST role, to modify the attributes and is uploaded status of assets belonging to any workspace or project within the Plane instance by guessing or enumerating asset UUIDs. The affected API endpoint is /api/v1/assets/{id} where id is the asset ID (pk).Recommendations
Versions prior to 1.2.2 should be updated to version 1.2.2 or later.
Exploit
Fix
IDOR
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Plane