CVE-2025-69284

4.3 MEDIUM

📋 TL;DR

This vulnerability in Plane.io allows guest users to access an API endpoint that lists workspace members, potentially exposing admin email addresses through display_name fields. It affects all Plane.io instances running versions before 1.2.0 where guest users have access to workspaces. The issue enables information disclosure that could facilitate targeted attacks.

💻 Affected Systems

Products:
  • Plane.io
Versions: All versions before 1.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects instances with guest user functionality enabled and workspaces containing admin users.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers identify admin email addresses and conduct sophisticated phishing campaigns or credential stuffing attacks against privileged accounts, potentially leading to account takeover and further system compromise.

🟠

Likely Case

Malicious guest users harvest admin email addresses for spam, phishing, or social engineering attempts against organization personnel.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure without direct system access or privilege escalation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires guest user access and involves simple API calls to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.0

Vendor Advisory: https://github.com/makeplane/plane/security/advisories/GHSA-7qx6-6739-c7qr

Restart Required: Yes

Instructions:

1. Backup your Plane instance data. 2. Update to version 1.2.0 or later using your deployment method (Docker, Kubernetes, etc.). 3. Restart the Plane service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict guest user permissions

all

Temporarily disable or restrict guest user access to workspaces until patching is complete.

API endpoint restriction

all

Configure web application firewall or reverse proxy to block guest access to /api/workspaces/*/members/ endpoints.

🧯 If You Can't Patch

  • Disable guest user functionality entirely in Plane configuration
  • Implement network segmentation to isolate Plane instance from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check if guest users can access /api/workspaces/{slug}/members/ endpoint and see user listings with email-related display names.

Check Version:

Check Plane version in admin panel or via docker inspect for containerized deployments.

Verify Fix Applied:

After updating to 1.2.0+, verify guest users cannot access the /api/workspaces/{slug}/members/ endpoint or that email information is properly redacted.

📡 Detection & Monitoring

Log Indicators:

  • Multiple GET requests to /api/workspaces/*/members/ from guest user accounts
  • Unusual API access patterns from guest accounts

Network Indicators:

  • HTTP 200 responses to /api/workspaces/*/members/ endpoints for guest users containing user listing data

SIEM Query:

source="plane" AND (uri_path="/api/workspaces/*/members/" AND user_role="guest")

🔗 References

📤 Share & Export