OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of the "Name of Organization" field when filling out case information. An authenticated attacker can inject an XSS payload which is executed in the context of a victim's session when they visit the case information page.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opexus
Opexus ecase Opexus ecomplaint |
|
| Vendors & Products |
Opexus
Opexus ecase Opexus ecomplaint |
Thu, 19 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of the "Name of Organization" field when filling out case information. An authenticated attacker can inject an XSS payload which is executed in the context of a victim's session when they visit the case information page. | |
| Title | OPEXUS eComplaint and eCASE XSS via Name of Organization field | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published: 2026-03-19T15:49:08.663Z
Updated: 2026-03-19T18:23:20.299Z
Reserved: 2026-03-16T20:58:00.591Z
Link: CVE-2026-32869
Updated: 2026-03-19T18:23:08.152Z
Status : Awaiting Analysis
Published: 2026-03-19T16:16:04.013
Modified: 2026-03-20T13:39:46.493
Link: CVE-2026-32869
No data.