OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of the "Name of Organization" field when filling out case information. An authenticated attacker can inject an XSS payload which is executed in the context of a victim's session when they visit the case information page.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of the "Name of Organization" field when filling out case information. An authenticated attacker can inject an XSS payload which is executed in the context of a victim's session when they visit the case information page. | |
| Title | OPEXUS eComplaint and eCASE XSS via Name of Organization field | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2026-03-19T18:23:20.299Z
Reserved: 2026-03-16T20:58:00.591Z
Link: CVE-2026-32869
Updated: 2026-03-19T18:23:08.152Z
Status : Received
Published: 2026-03-19T16:16:04.013
Modified: 2026-03-19T16:16:04.013
Link: CVE-2026-32869
No data.
OpenCVE Enrichment
No data.