Description
OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaScript or craft HTTP requests to access functions or buttons that have been disabled or blocked by an administrator. Fixed in eCASE Platform 11.14.1.0.
Published: 2026-01-08
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass
Action: Patch
AI Analysis

Impact

OPEXUS eCASE Audit allows an authenticated user to bypass restrictions by altering client‑side JavaScript or sending crafted HTTP requests, enabling access to functions or buttons normally disabled or blocked by an administrator. This flaw does not provide remote code execution; it simply permits the attacker to perform actions that should be prohibited by the system's authorization logic. The threat is limited to accounts with legitimate authentication credentials.

Affected Systems

All installations of OPEXUS eCASE Audit older than version 11.14.1.0 are vulnerable. The issue resides in the platform component that handles client‑side interfaces and authorization checks. OPEXUS provides the product eCASE Audit.

Risk and Exploitability

The CVSS score of 7.2 indicates a moderate severity. The EPSS score of less than 1% suggests exploitation is unlikely. The vulnerability is not listed in CISA KEV. Attack requires valid credentials, so compromised or weak user accounts present the primary risk. Once authenticated, the attacker can exploit the access‑control bypass without additional network exposure.

Generated by OpenCVE AI on April 18, 2026 at 16:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OPEXUS eCASE Audit to version 11.14.1.0 or newer, where the access control flaw is fixed.
  • Ensure that server‑side authorization checks reject any unsupported actions regardless of client‑side configuration or JavaScript manipulations.
  • Restrict privileged accounts and enforce least‑privilege by disabling or removing accounts that do not require elevated access.

Generated by OpenCVE AI on April 18, 2026 at 16:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Opexustech
Opexustech ecase Audit
CPEs cpe:2.3:a:opexustech:ecase_audit:*:*:*:*:*:*:*:*
Vendors & Products Opexustech
Opexustech ecase Audit

Sat, 10 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Opexus
Opexus ecase Audit
Vendors & Products Opexus
Opexus ecase Audit

Thu, 08 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
Description OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaScript or craft HTTP requests to access functions or buttons that have been disabled or blocked by an administrator. Fixed in eCASE Platform 11.14.1.0.
Title OPEXUS eCASE Audit incorrect access control
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Opexus Ecase Audit
Opexustech Ecase Audit
cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2026-01-16T18:04:14.143Z

Reserved: 2026-01-06T21:51:19.140Z

Link: CVE-2026-22230

cve-icon Vulnrichment

Updated: 2026-01-08T18:17:12.106Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T18:15:59.750

Modified: 2026-01-26T21:03:00.523

Link: CVE-2026-22230

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:45:05Z

Weaknesses