CVE-2026-1469
Stored XSS in RLE NOVA PlanManager Enables Data Theft
Publication date: 2026-01-29
Last updated on: 2026-03-09
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nova-a | planmanager | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in RLE NOVA's PlanManager. An attacker can inject malicious JavaScript code through the 'comment' and 'brand' parameters in the '/index.php' page. This malicious code is stored by the application and later executed in the browsers of other users who access the affected page, because the input is not properly sanitized. [1]
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to theft of sensitive user data such as session cookies, which can be used to hijack user sessions. It can also allow attackers to perform unauthorized actions on behalf of the user, potentially compromising user accounts and data. [1]
What immediate steps should I take to mitigate this vulnerability?
The affected website, planmanager.es, was taken down in October 2025, making the vulnerability no longer exploitable. Immediate mitigation steps include ensuring that any deployment of RLE NOVA's PlanManager is updated to a version that properly sanitizes inputs for the 'comment' and 'brand' parameters in '/index.php'. Additionally, avoid using the affected platform or take it offline until a patch is applied. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to steal sensitive user data such as session cookies and perform unauthorized actions on behalf of users, which could lead to violations of data protection regulations like GDPR or HIPAA that require safeguarding personal and sensitive information. However, specific impacts on compliance are not detailed in the provided resources. [1]