OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-077-01.json | Broken Link |
| https://www.cve.org/CVERecord?id=CVE-2026-32865 | Third Party Advisory |
Configurations
History
30 Mar 2026, 13:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:* | |
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-077-01.json - Broken Link | |
| References | () https://www.cve.org/CVERecord?id=CVE-2026-32865 - Third Party Advisory | |
| First Time |
Opexustech ecase Ecomplaint
Opexustech |
Information
Published : 2026-03-19 16:16
Updated : 2026-03-30 13:12
NVD link : CVE-2026-32865
Mitre link : CVE-2026-32865
CVE.ORG link : CVE-2026-32865
JSON object : View
Products Affected
opexustech
- ecase_ecomplaint
