CVE-2026-22232

5.5 MEDIUM

📋 TL;DR

This is a stored cross-site scripting (XSS) vulnerability in OPEXUS eCASE Audit software. Authenticated attackers can inject malicious JavaScript into the 'A or SIC Number' field during project setup, which executes when other users view the project. This affects all organizations using vulnerable versions of OPEXUS eCASE Audit.

💻 Affected Systems

Products:
  • OPEXUS eCASE Audit
Versions: All versions before 11.14.2.0
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to Project Setup functionality. The vulnerability exists in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as other users, redirect to malicious sites, or compromise user accounts through credential theft.

🟠

Likely Case

Attackers with authenticated access could perform session hijacking, deface projects, or steal sensitive data from other users viewing affected projects.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be rendered harmless as text rather than executed code.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple - just entering JavaScript in the vulnerable field. The stored nature makes it persistent.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.14.2.0

Vendor Advisory: https://docs.opexustech.com/docs/oig/audit/eCase_Audit_Release_Notes_11.14.2.0.pdf

Restart Required: Yes

Instructions:

1. Download OPEXUS eCASE Audit version 11.14.2.0 or later from official sources. 2. Backup current installation and database. 3. Run the installer/upgrade package. 4. Restart the application server. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize or reject JavaScript in the 'A or SIC Number' field

Output Encoding

all

Apply proper HTML encoding when displaying field contents to prevent script execution

🧯 If You Can't Patch

  • Restrict user permissions to limit who can access Project Setup functionality
  • Implement web application firewall (WAF) rules to detect and block XSS payloads in the vulnerable field

🔍 How to Verify

Check if Vulnerable:

Test by entering <script>alert('XSS')</script> in the 'A or SIC Number' field during Project Setup and checking if it executes when viewing the project

Check Version:

Check application version in the web interface or consult the installation directory for version information

Verify Fix Applied:

After patching, attempt the same test - the script should appear as plain text rather than executing

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript patterns in field inputs
  • Multiple failed login attempts followed by Project Setup access

Network Indicators:

  • HTTP requests containing script tags in the 'A or SIC Number' parameter
  • Unexpected outbound connections from user browsers after viewing projects

SIEM Query:

source="web_server_logs" AND (uri="*ProjectSetup*" OR uri="*project*view*") AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export