Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 26 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opexustech
Opexustech ecase Audit |
|
| CPEs | cpe:2.3:a:opexustech:ecase_audit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opexustech
Opexustech ecase Audit |
Sat, 10 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opexus
Opexus ecase Audit |
|
| Vendors & Products |
Opexus
Opexus ecase Audit |
Thu, 08 Jan 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaScript or craft HTTP requests to access functions or buttons that have been disabled or blocked by an administrator. Fixed in eCASE Platform 11.14.1.0. | |
| Title | OPEXUS eCASE Audit incorrect access control | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2026-01-16T18:04:14.143Z
Reserved: 2026-01-06T21:51:19.140Z
Link: CVE-2026-22230
Updated: 2026-01-08T18:17:12.106Z
Status : Analyzed
Published: 2026-01-08T18:15:59.750
Modified: 2026-01-26T21:03:00.523
Link: CVE-2026-22230
No data.
OpenCVE Enrichment
Updated: 2026-04-18T16:45:05Z