Home

Description

OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript as a comment within the Document Check Out functionality. The JavaScript is executed whenever another user views the Action History Log. Fixed in OPEXUS eCASE Platform 11.14.1.0.

PUBLISHED Reserved 2026-01-06 | Published 2026-01-08 | Updated 2026-01-08 | Assigner cisa-cg




MEDIUM: 5.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unknown

11.4.0 (custom) before 11.14.1.0
affected

11.14.1.0
unaffected

Credits

Aaron M. Ramirez, Son Nguyen, Wesley Cuffee, United States Department of Justice

References

docs.opexustech.com/...4.X/eCASE_Release_Notes_11.14.1.0.pdf (url) release-notes

raw.githubusercontent.com/...IT/white/2025/va-26-008-01.json (url) government-resource third-party-advisory

www.cve.org/CVERecord?id=CVE-2026-22231 (url) vdb-entry

cve.org (CVE-2026-22231)

nvd.nist.gov (CVE-2026-22231)

Download JSON