Vulnerability Description
OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript in the "A or SIC Number" field within the Project Setup functionality. The JavaScript is executed whenever another user views the project. Fixed in OPEXUS eCASE Audit 11.14.2.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opexustech | Ecase Audit | >= 11.4.0, < 11.14.2.0 |
Related Weaknesses (CWE)
References
- https://docs.opexustech.com/docs/oig/audit/eCase_Audit_Release_Notes_11.14.2.0.pRelease Notes
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/Broken Link
- https://www.cve.org/CVERecord?id=CVE-2026-22232Third Party Advisory
FAQ
What is CVE-2026-22232?
CVE-2026-22232 is a vulnerability with a CVSS score of 5.5 (MEDIUM). OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript in the "A or SIC Number" field within the Project Setup functionality. The JavaScript is executed whenever another user views the...
How severe is CVE-2026-22232?
CVE-2026-22232 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-22232?
Check the references section above for vendor advisories and patch information. Affected products include: Opexustech Ecase Audit.