CVE-2026-22231

5.5 MEDIUM

📋 TL;DR

This is a stored cross-site scripting (XSS) vulnerability in OPEXUS eCASE Audit. An authenticated attacker can inject malicious JavaScript into comments via the Document Check Out functionality, which then executes when other users view the Action History Log. This affects all OPEXUS eCASE Audit users with access to the vulnerable functionality.

💻 Affected Systems

Products:
  • OPEXUS eCASE Audit
Versions: All versions before 11.14.1.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Document Check Out functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as other users, redirect to malicious sites, or compromise user accounts through credential theft.

🟠

Likely Case

Attackers with authenticated access could perform session hijacking, deface pages, or steal sensitive data from other users viewing the logs.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be rendered harmless as plain text.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing instances could be targeted by attackers who obtain credentials.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to escalate privileges or move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in the comment saving functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.14.1.0

Vendor Advisory: https://docs.opexustech.com/docs/eCase/11.14.X/eCASE_Release_Notes_11.14.1.0.pdf

Restart Required: Yes

Instructions:

1. Download OPEXUS eCASE Platform version 11.14.1.0 or later. 2. Follow vendor upgrade procedures. 3. Restart the application/services. 4. Verify the fix by testing comment functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize JavaScript from comments before storage.

Output Encoding

all

Apply proper output encoding when displaying comments in the Action History Log.

🧯 If You Can't Patch

  • Restrict access to Document Check Out functionality to only trusted users who need it.
  • Implement web application firewall (WAF) rules to detect and block XSS payloads in comment fields.

🔍 How to Verify

Check if Vulnerable:

Test by saving a comment with JavaScript payload (e.g., <script>alert('test')</script>) via Document Check Out and checking if it executes when viewing Action History Log.

Check Version:

Check application version in admin interface or via vendor documentation.

Verify Fix Applied:

After patching, attempt the same test - JavaScript should be displayed as plain text without execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual comment entries containing script tags or JavaScript code
  • Multiple failed login attempts followed by comment creation

Network Indicators:

  • HTTP requests with JavaScript payloads in comment parameters
  • Unexpected outbound connections from user browsers after viewing logs

SIEM Query:

source="web_logs" AND (uri="*/comment*" OR uri="*/history*") AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export