CVE-2026-22235

7.5 HIGH

📋 TL;DR

This vulnerability in OPEXUS eComplaint allows unauthenticated attackers to download sensitive files by guessing predictable charge numbers. It affects all OPEXUS eComplaint installations before version 9.0.45.0 that have the vulnerable DocumentOpen.aspx endpoint accessible.

💻 Affected Systems

Products:
  • OPEXUS eComplaint
Versions: All versions before 9.0.45.0
Operating Systems: Windows (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any installation with the DocumentOpen.aspx endpoint accessible. The vulnerability exists in the file download functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all uploaded documents including sensitive case files, evidence, and personally identifiable information, potentially leading to data breaches, regulatory violations, and legal consequences.

🟠

Likely Case

Unauthorized access to confidential case documents and evidence files, compromising case integrity and exposing sensitive information.

🟢

If Mitigated

Limited exposure if proper access controls and monitoring are in place, with only minimal data leakage possible.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could still exploit this to access unauthorized documents.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires guessing or enumerating charge numbers, which may follow predictable patterns. No authentication is required to access the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.45.0

Vendor Advisory: https://www.cve.org/CVERecord?id=CVE-2026-22235

Restart Required: Yes

Instructions:

1. Download OPEXUS eComplaint version 9.0.45.0 or later from vendor portal. 2. Backup current installation and database. 3. Install the update following vendor documentation. 4. Restart application services. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Restrict DocumentOpen.aspx Access

windows

Block or restrict access to the vulnerable DocumentOpen.aspx endpoint using web server or firewall rules.

# IIS URL Rewrite rule to block DocumentOpen.aspx
<rule name="Block DocumentOpen" stopProcessing="true">
  <match url="^DocumentOpen\.aspx" />
  <action type="CustomResponse" statusCode="403" statusReason="Forbidden" statusDescription="Access Denied" />
</rule>

Implement Rate Limiting

windows

Configure rate limiting on the DocumentOpen.aspx endpoint to prevent automated enumeration.

# Example for IIS using Dynamic IP Restrictions
# Enable in IIS Manager: IP and Domain Restrictions -> Edit Dynamic Restrictions Settings

🧯 If You Can't Patch

  • Implement strict access controls and authentication requirements for the DocumentOpen.aspx endpoint.
  • Deploy a web application firewall (WAF) with rules to detect and block enumeration attempts on chargeNumber parameter.

🔍 How to Verify

Check if Vulnerable:

Attempt to access DocumentOpen.aspx with a known chargeNumber parameter. If files download without proper authentication, the system is vulnerable.

Check Version:

Check application version in administrative interface or via vendor-provided version check utility.

Verify Fix Applied:

After patching, attempt the same access and verify proper authentication is required. Check that version is 9.0.45.0 or later.

📡 Detection & Monitoring

Log Indicators:

  • Multiple rapid requests to DocumentOpen.aspx with different chargeNumber values
  • Failed authentication attempts followed by successful DocumentOpen.aspx access
  • Unusual file download patterns from the DocumentOpen endpoint

Network Indicators:

  • HTTP GET requests to /DocumentOpen.aspx with chargeNumber parameter
  • Pattern of sequential or predictable chargeNumber values in requests
  • High volume of requests to the DocumentOpen endpoint

SIEM Query:

source="web_server" AND url="*DocumentOpen.aspx*" AND (chargeNumber="*" OR parameter_count>normal) | stats count by src_ip, url

🔗 References

📤 Share & Export