Description
OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of first and last name fields in the 'My Information' screen. An authenticated attacker can inject parts of an XSS payload in the first and last name fields. The payload is executed when the full name is rendered. The attacker can run script in the context of a victim's session.
Published: 2026-03-19
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting via user‑profile data
Action: Patch Updates
AI Analysis

Impact

First and last name fields on the My Information screen are not sanitized in OPEXUS eComplaint and eCASE products before 10.2.0.0. An attacker who can authenticate into the system can inject portions of an XSS payload into those fields. When the full name is later rendered for a victim, the malicious script runs in the victim’s browser session, allowing the attacker to execute arbitrary code within the context of that user. This enables theft of session cookies, credential hijacking, or other client‑side manipulation. The weakness aligns with standard reflected XSS vulnerabilities. The impact is primarily to confidentiality and integrity of the victim’s session data; availability is not directly affected.

Affected Systems

Affected products are OPEXUS eCASE and OPEXUS eComplaint. Version releases prior to 10.2.0.0 contain the flaw. Users of any older release should verify the exact build against the version criteria.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. The EPSS probability is below 1 %, suggesting that exploitation is unlikely in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires an authenticated user with access to the My Information screen; once logged in, the attacker can construct the payload. The lack of a public exploitation report and the low EPSS reduce the immediate risk but do not eliminate the need for remediation.

Generated by OpenCVE AI on March 30, 2026 at 14:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OPEXUS eComplaint and eCASE to version 10.2.0.0 or later
  • Verify that the provided patch correctly sanitizes name fields
  • If an update is not yet available, restrict user access to the My Information screen via role‑based permissions
  • Consult the referenced advisories for any temporary mitigations identified by the vendor

Generated by OpenCVE AI on March 30, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Opexustech
Opexustech ecase Ecomplaint
CPEs cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:*
Vendors & Products Opexustech
Opexustech ecase Ecomplaint

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Opexus
Opexus ecase
Opexus ecomplaint
Vendors & Products Opexus
Opexus ecase
Opexus ecomplaint

Thu, 19 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of first and last name fields in the 'My Information' screen. An authenticated attacker can inject parts of an XSS payload in the first and last name fields. The payload is executed when the full name is rendered. The attacker can run script in the context of a victim's session.
Title OPEXUS eComplaint and eCASE XSS via my information
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Opexus Ecase Ecomplaint
Opexustech Ecase Ecomplaint
cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2026-03-19T18:22:51.189Z

Reserved: 2026-03-16T20:57:55.705Z

Link: CVE-2026-32868

cve-icon Vulnrichment

Updated: 2026-03-19T18:22:47.396Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T16:16:03.833

Modified: 2026-03-30T13:06:05.653

Link: CVE-2026-32868

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:59:05Z

Weaknesses