CVE-2025-50251

9.1 CRITICAL

📋 TL;DR

This SSRF vulnerability in makeplane plane 0.23.1 allows attackers to make unauthorized requests from the server via the password recovery feature. Attackers can potentially access internal services, exfiltrate data, or perform other malicious actions. Organizations using makeplane plane 0.23.1 are affected.

💻 Affected Systems

Products:
  • makeplane plane
Versions: 0.23.1
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with password recovery functionality enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network services, data exfiltration from cloud metadata services, or chaining with other vulnerabilities for full system takeover.

🟠

Likely Case

Unauthorized access to internal APIs, credential harvesting from metadata services, or scanning of internal network resources.

🟢

If Mitigated

Limited to failed SSRF attempts with proper network segmentation and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires no authentication and is publicly available in exploit databases.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.23.2 or later

Vendor Advisory: https://github.com/makeplane/plane/releases

Restart Required: Yes

Instructions:

1. Backup current installation. 2. Update to makeplane plane 0.23.2 or later. 3. Restart the plane service. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Disable password recovery

all

Temporarily disable the password recovery functionality until patching is complete.

Edit plane configuration to disable password recovery feature

Network segmentation

all

Restrict outbound network access from the plane server to only necessary services.

Configure firewall rules to limit outbound connections from plane server

🧯 If You Can't Patch

  • Implement strict input validation on password recovery endpoints
  • Deploy WAF rules to block SSRF patterns in requests

🔍 How to Verify

Check if Vulnerable:

Check if makeplane plane version is 0.23.1 and password recovery is enabled.

Check Version:

plane --version or check package manager

Verify Fix Applied:

Verify version is 0.23.2 or later and test password recovery functionality with SSRF payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound requests from plane server
  • Password recovery attempts with unusual URLs

Network Indicators:

  • Outbound requests to internal IPs from plane server
  • Requests to cloud metadata services

SIEM Query:

source="plane" AND (url_contains="169.254.169.254" OR url_contains="metadata")

🔗 References

📤 Share & Export