Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2337: CWE-79 - XSS in Plunet Plunet BusinessManager

0
High
VulnerabilityCVE-2026-2337cvecve-2026-2337cwe-79
Published: Wed Feb 11 2026 (02/11/2026, 13:28:30 UTC)
Source: CVE Database V5
Vendor/Project: Plunet
Product: Plunet BusinessManager

Description

A vulnerability in Plunet Plunet BusinessManager allows session hijacking, data theft, unauthorized actions on behalf of the user.This issue affects Plunet BusinessManager: 10.15.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 15:22:51 UTC

Technical Analysis

CVE-2026-2337 is a cross-site scripting (CWE-79) vulnerability identified in Plunet BusinessManager version 10.15.1, a software widely used for translation management and business process automation in language service providers. The vulnerability allows an attacker to inject malicious scripts into web pages viewed by authenticated users. When a victim interacts with the malicious content, the attacker can hijack the user's session, steal sensitive data, or perform unauthorized actions within the application context. The CVSS 4.0 base score of 8.7 reflects a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:P). The vulnerability impacts confidentiality and integrity highly, with limited availability impact. The scope is limited to the affected version 10.15.1, and no authentication is required to initiate the attack, increasing its risk. Although no public exploits are reported yet, the nature of XSS vulnerabilities and the criticality of the affected data make this a significant threat. The lack of a patch link suggests that remediation may require vendor intervention or temporary mitigations. The vulnerability is particularly dangerous in environments where users have elevated privileges or access to sensitive business data, as unauthorized actions could lead to financial or reputational damage.

Potential Impact

For European organizations, especially those in the translation, localization, and language service sectors that rely on Plunet BusinessManager, this vulnerability poses a significant risk. Successful exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users and access confidential client data, project details, and financial information. Unauthorized actions could disrupt business workflows, cause data corruption, or result in fraudulent transactions. The breach of confidentiality and integrity could also lead to regulatory non-compliance under GDPR, exposing organizations to legal penalties and loss of customer trust. Given the network-based attack vector and no requirement for authentication, attackers can target users remotely, increasing the threat surface. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates that exploitation could have severe consequences if weaponized.

Mitigation Recommendations

European organizations should immediately assess their use of Plunet BusinessManager version 10.15.1 and prioritize upgrading to a patched version once available. Until a patch is released, implement strict input validation and output encoding on all user-supplied data to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. Educate users about the risks of clicking unknown or suspicious links, especially those received via email or messaging platforms. Monitor web application logs for unusual activity indicative of exploitation attempts. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting Plunet BusinessManager. Limit user privileges to the minimum necessary to reduce the impact of potential session hijacking. Finally, coordinate with Plunet support for timely updates and advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TCS-CERT
Date Reserved
2026-02-11T10:58:48.725Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c8bab4b57a58fa19a50d7

Added to database: 2/11/2026, 2:01:15 PM

Last enriched: 2/18/2026, 3:22:51 PM

Last updated: 3/28/2026, 10:07:30 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses