CVE-2026-22231

OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript as a comment within the Document Check Out functionality. The JavaScript is executed whenever another user views the Action History Log. Fixed in OPEXUS eCASE Platform 11.14.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opexustech:ecase_audit:*:*:*:*:*:*:*:*

History

05 Feb 2026, 19:23

Type Values Removed Values Added
CPE cpe:2.3:a:opexustech:ecase_audit:*:*:*:*:*:*:*:*
First Time Opexustech ecase Audit
Opexustech
References () https://docs.opexustech.com/docs/eCase/11.14.X/eCASE_Release_Notes_11.14.1.0.pdf - () https://docs.opexustech.com/docs/eCase/11.14.X/eCASE_Release_Notes_11.14.1.0.pdf - Release Notes
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-01.json - Broken Link
References () https://www.cve.org/CVERecord?id=CVE-2026-22231 - () https://www.cve.org/CVERecord?id=CVE-2026-22231 - Third Party Advisory

08 Jan 2026, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-08 18:15

Updated : 2026-02-05 19:23


NVD link : CVE-2026-22231

Mitre link : CVE-2026-22231

CVE.ORG link : CVE-2026-22231


JSON object : View

Products Affected

opexustech

  • ecase_audit
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')