Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32865: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in OPEXUS eComplaint

0
Critical
VulnerabilityCVE-2026-32865cvecve-2026-32865cwe-200cwe-640
Published: Thu Mar 19 2026 (03/19/2026, 15:47:59 UTC)
Source: CVE Database V5
Vendor/Project: OPEXUS
Product: eComplaint

Description

OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process.

AI-Powered Analysis

AILast updated: 03/19/2026, 16:23:42 UTC

Technical Analysis

CVE-2026-32865 is a critical security vulnerability affecting OPEXUS eComplaint and eCASE products before version 10.1.0.0. The flaw arises from the inclusion of the secret verification code in the HTTP response when a password reset is requested via the 'ForcePasswordReset.aspx' endpoint. This secret code is intended to be confidential and used to verify the legitimacy of the password reset request. However, because it is exposed directly in the HTTP response, an attacker who knows a valid user's email address can retrieve this code and reset the user's password and security questions without needing to answer any existing security questions or provide authentication. This bypasses standard security controls designed to prevent unauthorized password resets. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and CWE-640 (Weak Password Recovery Mechanism). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability's nature makes it highly exploitable and dangerous. The affected versions include all prior to 10.1.0.0, and no official patches are listed yet, emphasizing the need for immediate mitigation.

Potential Impact

This vulnerability allows attackers to take over user accounts by resetting passwords and security questions without authentication or user interaction, leading to full compromise of user identities within the OPEXUS eComplaint and eCASE systems. The exposure of the secret verification code compromises confidentiality, while unauthorized password resets impact integrity and availability of user accounts. Organizations relying on these products for complaint management or case handling risk unauthorized access to sensitive personal or organizational data, potential data breaches, and disruption of services. The critical severity and ease of exploitation mean attackers can quickly compromise multiple accounts if they know valid email addresses, potentially leading to broader system compromise or data leakage. This could damage organizational reputation, violate privacy regulations, and cause operational disruptions.

Mitigation Recommendations

Organizations should immediately upgrade OPEXUS eComplaint and eCASE to version 10.1.0.0 or later once available, as this version addresses the vulnerability. Until patches are applied, restrict access to the 'ForcePasswordReset.aspx' endpoint via network controls such as firewalls or web application firewalls (WAF) to limit exposure. Implement monitoring and alerting for unusual password reset requests or multiple resets from the same IP or targeting the same user. Enforce multi-factor authentication (MFA) on user accounts to reduce the impact of compromised credentials. Review and strengthen password reset workflows to ensure secret verification codes are never exposed in responses and that security questions or other verification steps are enforced. Conduct user awareness campaigns to alert users about potential phishing or social engineering attempts exploiting this vulnerability. Finally, audit logs for suspicious activity related to password resets and investigate any anomalies promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2026-03-16T20:57:07.192Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bc1fb1e32a4fbe5fd82127

Added to database: 3/19/2026, 4:09:21 PM

Last enriched: 3/19/2026, 4:23:42 PM

Last updated: 3/20/2026, 5:19:25 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses