Description
OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of the "Name of Organization" field when filling out case information. An authenticated attacker can inject an XSS payload which is executed in the context of a victim's session when they visit the case information page.
Published: 2026-03-19
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross Site Scripting that can steal session information
Action: Immediate Patch
AI Analysis

Impact

An XSS vulnerability exists in OPEXUS eComplaint and eCASE when an attacker supplies a malicious payload in the "Name of Organization" field of case information. Because the input is not sanitized, the payload runs in the victim’s browser context whenever the case page is viewed. The attacker can hijack the victim’s session, steal credentials, or inject further malicious actions. This weakness is categorized as an input validation flaw (CWE‑79).

Affected Systems

The flaw is present in versions of OPEXUS eComplaint and eCASE older than 10.2.0.0. All installations of these products that do not apply the 10.2.0.0 or newer release are susceptible.

Risk and Exploitability

The CVSS score of 5.1 indicates medium impact, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker must be authenticated and have permissions to create or edit case information to inject the payload. Once the payload is entered, any user who views the case page will have the code executed in their session context, potentially leading to credential theft or further attacks.

Generated by OpenCVE AI on March 30, 2026 at 14:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OPEXUS eComplaint and eCASE to version 10.2.0.0 or newer.
  • If upgrade is not immediately possible, restrict editing rights for the "Name of Organization" field or manually sanitize the input before rendering it.
  • Verify the update by checking that special characters in the field are properly escaped on the case information page.
  • Monitor logs for suspicious XSS attempts and educate users to report unexpected script execution.

Generated by OpenCVE AI on March 30, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Opexustech
Opexustech ecase Ecomplaint
CPEs cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:*
Vendors & Products Opexustech
Opexustech ecase Ecomplaint

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Opexus
Opexus ecase
Opexus ecomplaint
Vendors & Products Opexus
Opexus ecase
Opexus ecomplaint

Thu, 19 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of the "Name of Organization" field when filling out case information. An authenticated attacker can inject an XSS payload which is executed in the context of a victim's session when they visit the case information page.
Title OPEXUS eComplaint and eCASE XSS via Name of Organization field
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Opexus Ecase Ecomplaint
Opexustech Ecase Ecomplaint
cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2026-03-19T18:23:20.299Z

Reserved: 2026-03-16T20:58:00.591Z

Link: CVE-2026-32869

cve-icon Vulnrichment

Updated: 2026-03-19T18:23:08.152Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T16:16:04.013

Modified: 2026-03-30T13:04:52.380

Link: CVE-2026-32869

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:59:04Z

Weaknesses