CVE-2026-22232

OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript in the "A or SIC Number" field within the Project Setup functionality. The JavaScript is executed whenever another user views the project. Fixed in OPEXUS eCASE Audit 11.14.2.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opexustech:ecase_audit:*:*:*:*:*:*:*:*

History

05 Feb 2026, 19:24

Type Values Removed Values Added
References () https://docs.opexustech.com/docs/oig/audit/eCase_Audit_Release_Notes_11.14.2.0.pdf - () https://docs.opexustech.com/docs/oig/audit/eCase_Audit_Release_Notes_11.14.2.0.pdf - Release Notes
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-01.json - Broken Link
References () https://www.cve.org/CVERecord?id=CVE-2026-22232 - () https://www.cve.org/CVERecord?id=CVE-2026-22232 - Third Party Advisory
CPE cpe:2.3:a:opexustech:ecase_audit:*:*:*:*:*:*:*:*
First Time Opexustech ecase Audit
Opexustech

08 Jan 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-08 18:16

Updated : 2026-02-05 19:24


NVD link : CVE-2026-22232

Mitre link : CVE-2026-22232

CVE.ORG link : CVE-2026-22232


JSON object : View

Products Affected

opexustech

  • ecase_audit
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')