JavaScript Injection Risk in OPEXUS eCASE Audit by OPEXUS
CVE-2026-22232
4.8MEDIUM
What is CVE-2026-22232?
OPEXUS eCASE Audit allows authenticated attackers to inject malicious JavaScript into the 'A or SIC Number' field during project setup. This injected code executes in the context of the user who views the project, potentially leading to theft of sensitive information or session hijacking. Users are encouraged to upgrade to version 11.14.2.0 or later to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
eCASE Audit 11.4.0 < 11.14.2.0
eCASE Audit 11.14.2.0
References
CVSS V4
Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Aaron M. Ramirez, Son Nguyen, Wesley Cuffee, United States Department of Justice
