Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opexustech
Opexustech ecase Ecomplaint |
|
| CPEs | cpe:2.3:a:opexustech:ecase_ecomplaint:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opexustech
Opexustech ecase Ecomplaint |
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opexus
Opexus ecase Opexus ecomplaint |
|
| Vendors & Products |
Opexus
Opexus ecase Opexus ecomplaint |
Thu, 19 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process. | |
| Title | OPEXUS eComplaint and eCase insecure password reset | |
| Weaknesses | CWE-200 CWE-640 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2026-03-19T18:20:51.170Z
Reserved: 2026-03-16T20:57:07.192Z
Link: CVE-2026-32865
Updated: 2026-03-19T18:20:40.656Z
Status : Analyzed
Published: 2026-03-19T16:16:03.260
Modified: 2026-03-30T13:12:06.900
Link: CVE-2026-32865
No data.
OpenCVE Enrichment
Updated: 2026-03-30T20:59:08Z