OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-077-01.json | Broken Link |
| https://www.cve.org/CVERecord?id=CVE-2026-32865 | Third Party Advisory |
Configurations
History
30 Mar 2026, 13:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:* | |
| First Time |
Opexustech ecase Ecomplaint
Opexustech |
|
| Summary |
|
|
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-077-01.json - Broken Link | |
| References | () https://www.cve.org/CVERecord?id=CVE-2026-32865 - Third Party Advisory |
19 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 16:16
Updated : 2026-03-30 13:12
NVD link : CVE-2026-32865
Mitre link : CVE-2026-32865
CVE.ORG link : CVE-2026-32865
JSON object : View
Products Affected
opexustech
- ecase_ecomplaint
