CVE-2026-1469
Unknown Unknown - Not Provided
Stored XSS in RLE NOVA PlanManager Enables Data Theft

Publication date: 2026-01-29

Last updated on: 2026-03-09

Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)

Description
Stored Cross-Site Scripting (XSS) in RLE NOVA's PlanManager. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by injecting malicious payload through the ‘comment’ and ‘brand’ parameters in ‘/index.php’. The payload is stored by the application and subsequently displayed without proper sanitization when other users access it. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-29
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nova-a planmanager *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Stored Cross-Site Scripting (XSS) issue in RLE NOVA's PlanManager. An attacker can inject malicious JavaScript code through the 'comment' and 'brand' parameters in the '/index.php' page. This malicious code is stored by the application and later executed in the browsers of other users who access the affected page, because the input is not properly sanitized. [1]


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to theft of sensitive user data such as session cookies, which can be used to hijack user sessions. It can also allow attackers to perform unauthorized actions on behalf of the user, potentially compromising user accounts and data. [1]


What immediate steps should I take to mitigate this vulnerability?

The affected website, planmanager.es, was taken down in October 2025, making the vulnerability no longer exploitable. Immediate mitigation steps include ensuring that any deployment of RLE NOVA's PlanManager is updated to a version that properly sanitizes inputs for the 'comment' and 'brand' parameters in '/index.php'. Additionally, avoid using the affected platform or take it offline until a patch is applied. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to steal sensitive user data such as session cookies and perform unauthorized actions on behalf of users, which could lead to violations of data protection regulations like GDPR or HIPAA that require safeguarding personal and sensitive information. However, specific impacts on compliance are not detailed in the provided resources. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart