VA-26-008-02
Vulnerability from csaf_cisa - Published: 2026-01-07 16:35 - Updated: 2026-01-07 16:35Summary
OPEXUS eComplaint and eCasePortal IDOR
Notes
Legal Notice
All information products included in [https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white](https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white) are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see [https://us-cert.cisa.gov/tlp/](https://us-cert.cisa.gov/tlp/).
Countries and Areas Deployed
Worldwide
Critical Infrastructure Sectors
Information Technology
Risk Evaluation
OPEXUS eCasePortal and eComplaint before version 9.0.45.0 allow an unauthenticated attacker to iterate through predictable URL parameters and download all available files. The eCasePortal vulnerability allows attackers to upload and delete files as well.
Recommended Practices
Fixed in eCasePortal and eComplaint version 9.0.45.0, released 2025-12-09.
Company Headquarters Location
United States
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in [https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white](https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white) are provided \\\"as is\\\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see [https://us-cert.cisa.gov/tlp/](https://us-cert.cisa.gov/tlp/).",
"title": "Legal Notice"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries and Areas Deployed"
},
{
"category": "other",
"text": "Information Technology",
"title": "Critical Infrastructure Sectors"
},
{
"category": "summary",
"text": "OPEXUS eCasePortal and eComplaint before version 9.0.45.0 allow an unauthenticated attacker to iterate through predictable URL parameters and download all available files. The eCasePortal vulnerability allows attackers to upload and delete files as well.",
"title": "Risk Evaluation"
},
{
"category": "general",
"text": "Fixed in eCasePortal and eComplaint version 9.0.45.0, released 2025-12-09.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "United States",
"title": "Company Headquarters Location"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "https://www.cisa.gov/report",
"issuing_authority": "CISA",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "Vulnerability Advisory VA-26-008-02 CSAF",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-02.json"
}
],
"title": "OPEXUS eComplaint and eCasePortal IDOR",
"tracking": {
"current_release_date": "2026-01-07T16:35:11Z",
"generator": {
"engine": {
"name": "VINCE-NT",
"version": "1.11.0"
}
},
"id": "VA-26-008-02",
"initial_release_date": "2026-01-07T16:35:11Z",
"revision_history": [
{
"date": "2026-01-07T16:35:11Z",
"number": "1.0.0",
"summary": "Initial publication"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.0.45.0",
"product": {
"name": "OPEXUS eCase Portal \u003c9.0.45.0",
"product_id": "CSAFPID-0001"
}
},
{
"category": "product_version",
"name": "9.0.45.0",
"product": {
"name": "OPEXUS eCase Portal 9.0.45.0",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "eCase Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.0.45.0",
"product": {
"name": "OPEXUS eComplaint \u003c9.0.45.0",
"product_id": "CSAFPID-0003"
}
},
{
"category": "product_version",
"name": "9.0.45.0",
"product": {
"name": "OPEXUS eComplaint 9.0.45.0",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "eComplaint"
}
],
"category": "vendor",
"name": "OPEXUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Zach Crosman"
],
"organization": "CISA"
}
],
"cve": "CVE-2026-22234",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "summary",
"text": "OPEXUS eCasePortal before version 9.0.45.0 allows an unauthenticated attacker to navigate to the \u0027Attachments.aspx\u0027 endpoint, iterate through predictable values of \u0027formid\u0027, and download or delete all user-uploaded files, or upload new files.",
"title": "Description"
},
{
"category": "details",
"text": "SSVCv2/E:P/A:Y/T:P/2026-01-06T23:05:51Z/",
"title": "SSVC"
}
],
"product_status": {
"fixed": [
"CSAFPID-0002"
],
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22234"
},
{
"category": "external",
"summary": "raw.githubusercontent.com",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-02.json"
}
],
"release_date": "2026-01-08T00:00:00Z",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T00:00:00Z",
"details": "Fixed in 9.0.45.0.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"date": "2025-12-09T00:00:00Z",
"details": "Fixed in 9.0.45.0.",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "OPEXUS eCasePortal unauthenticated IDOR"
},
{
"acknowledgments": [
{
"names": [
"Zach Crosman"
],
"organization": "CISA"
}
],
"cve": "CVE-2026-22235",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "summary",
"text": "OPEXUS eComplaint before version 9.0.45.0 allows an attacker to visit the the \u0027DocumentOpen.aspx\u0027 endpoint, iterate through predictable values of \u0027chargeNumber\u0027, and download any uploaded files.",
"title": "Description"
},
{
"category": "details",
"text": "SSVCv2/E:P/A:Y/T:P/2026-01-05T16:31:59Z/",
"title": "SSVC"
}
],
"product_status": {
"fixed": [
"CSAFPID-0004"
],
"known_affected": [
"CSAFPID-0003"
]
},
"references": [
{
"category": "external",
"summary": "raw.githubusercontent.com",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-02.json"
},
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22235"
}
],
"release_date": "2026-01-08T00:00:00Z",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-09T00:00:00Z",
"details": "Fixed in 9.0.45.0.",
"product_ids": [
"CSAFPID-0003"
]
},
{
"category": "vendor_fix",
"date": "2025-12-09T00:00:00Z",
"details": "Fixed in 9.0.45.0.",
"product_ids": [
"CSAFPID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0003"
]
}
],
"title": "OPEXUS eComplaint IDOR"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…