CVE-2026-32865

OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:*

History

30 Mar 2026, 13:12

Type Values Removed Values Added
CPE cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:*
First Time Opexustech ecase Ecomplaint
Opexustech
Summary
  • (es) OPEXUS eComplaint y eCASE antes de la versión 10.1.0.0 incluyen el código de verificación secreto en la respuesta HTTP al solicitar un restablecimiento de contraseña a través de 'ForcePasswordReset.aspx'. Un atacante que conoce la dirección de correo electrónico de un usuario existente puede restablecer la contraseña y las preguntas de seguridad del usuario. Las preguntas de seguridad existentes no se solicitan durante el proceso.
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-077-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-077-01.json - Broken Link
References () https://www.cve.org/CVERecord?id=CVE-2026-32865 - () https://www.cve.org/CVERecord?id=CVE-2026-32865 - Third Party Advisory

19 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 16:16

Updated : 2026-03-30 13:12


NVD link : CVE-2026-32865

Mitre link : CVE-2026-32865

CVE.ORG link : CVE-2026-32865


JSON object : View

Products Affected

opexustech

  • ecase_ecomplaint
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-640

Weak Password Recovery Mechanism for Forgotten Password