CVE-2026-27705

Plane is an an open-source project management tool. Prior to version 1.2.2, the `ProjectAssetEndpoint.patch()` method in `apps/api/plane/app/views/asset/v2.py` (lines 579–593) performs a global asset lookup using only the asset ID (`pk`) via `FileAsset.objects.get(id=pk)`, without verifying that the asset belongs to the workspace and project specified in the URL path. This allows any authenticated user (including those with the GUEST role) to modify the `attributes` and `is_uploaded` status of assets belonging to any workspace or project in the entire Plane instance by guessing or enumerating asset UUIDs. Version 1.2.2 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-25 17:25

Updated : 2026-02-27 17:37


NVD link : CVE-2026-27705

Mitre link : CVE-2026-27705

CVE.ORG link : CVE-2026-27705


JSON object : View

Products Affected

plane

  • plane
CWE
CWE-639

Authorization Bypass Through User-Controlled Key