CVE-2026-32865

OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:*

History

30 Mar 2026, 13:12

Type Values Removed Values Added
CPE cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:*
References () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-077-01.json - () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-077-01.json - Broken Link
References () https://www.cve.org/CVERecord?id=CVE-2026-32865 - () https://www.cve.org/CVERecord?id=CVE-2026-32865 - Third Party Advisory
First Time Opexustech ecase Ecomplaint
Opexustech

Information

Published : 2026-03-19 16:16

Updated : 2026-03-30 13:12


NVD link : CVE-2026-32865

Mitre link : CVE-2026-32865

CVE.ORG link : CVE-2026-32865


JSON object : View

Products Affected

opexustech

  • ecase_ecomplaint
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-640

Weak Password Recovery Mechanism for Forgotten Password