OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript as a comment within the Document Check Out functionality. The JavaScript is executed whenever another user views the Action History Log. Fixed in OPEXUS eCASE Platform 11.14.1.0.
References
| Link | Resource |
|---|---|
| https://docs.opexustech.com/docs/eCase/11.14.X/eCASE_Release_Notes_11.14.1.0.pdf | Release Notes |
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-01.json | Broken Link |
| https://www.cve.org/CVERecord?id=CVE-2026-22231 | Third Party Advisory |
Configurations
History
05 Feb 2026, 19:23
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:opexustech:ecase_audit:*:*:*:*:*:*:*:* | |
| First Time |
Opexustech ecase Audit
Opexustech |
|
| References | () https://docs.opexustech.com/docs/eCase/11.14.X/eCASE_Release_Notes_11.14.1.0.pdf - Release Notes | |
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-01.json - Broken Link | |
| References | () https://www.cve.org/CVERecord?id=CVE-2026-22231 - Third Party Advisory |
08 Jan 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-08 18:15
Updated : 2026-02-05 19:23
NVD link : CVE-2026-22231
Mitre link : CVE-2026-22231
CVE.ORG link : CVE-2026-22231
JSON object : View
Products Affected
opexustech
- ecase_audit
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
