Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32867: CWE-639 Authorization Bypass Through User-Controlled Key in OPEXUS eComplaint

0
Medium
VulnerabilityCVE-2026-32867cvecve-2026-32867cwe-639cwe-425
Published: Thu Mar 19 2026 (03/19/2026, 15:48:35 UTC)
Source: CVE Database V5
Vendor/Project: OPEXUS
Product: eComplaint

Description

CVE-2026-32867 is a medium severity vulnerability in OPEXUS eComplaint versions prior to 10. 1. 0. 0 that allows unauthenticated attackers to upload arbitrary files by guessing existing case numbers via the 'Portal/EEOC/DocumentUploadPub. aspx' endpoint. This authorization bypass through user-controlled keys (CWE-639) enables attackers to inject unexpected files into complaint cases, potentially causing data integrity issues and storage exhaustion. Exploitation requires no authentication but does require user interaction, such as triggering file uploads. While no known exploits are currently reported in the wild, the vulnerability could be leveraged to disrupt case management or facilitate further attacks. Organizations using OPEXUS eComplaint should prioritize patching and implement strict access controls and input validation to mitigate risks. Countries with significant deployments of OPEXUS eComplaint, particularly those with regulatory complaint management needs, are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 19:28:59 UTC

Technical Analysis

CVE-2026-32867 identifies a security flaw in OPEXUS eComplaint software versions before 10.1.0.0, where an unauthenticated attacker can bypass authorization controls by exploiting a user-controlled key mechanism related to case numbers. Specifically, the vulnerability resides in the 'Portal/EEOC/DocumentUploadPub.aspx' endpoint, which allows attackers to upload arbitrary files to complaint cases by guessing or obtaining valid case numbers. This is categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-425 (Direct Request). The attacker does not need valid credentials but must interact with the system to upload files. Uploaded files appear in the targeted cases, potentially confusing users and corrupting case data integrity. Additionally, uploading a large volume of files can lead to storage exhaustion, impacting system availability. The vulnerability does not disclose sensitive information directly but compromises data integrity and availability. No patches or exploits are currently documented, but the risk remains due to the ease of exploitation (no authentication required) and the potential for denial-of-service through resource consumption. The CVSS 3.1 base score is 5.4, reflecting network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, low integrity impact, and low availability impact.

Potential Impact

The vulnerability allows attackers to inject arbitrary files into complaint cases, undermining the integrity of case data and potentially misleading users or administrators. This can disrupt complaint processing workflows and damage organizational trust in the system. The ability to upload many files can exhaust storage resources, causing denial-of-service conditions that degrade availability of the eComplaint platform. Although confidentiality is not directly impacted, the integrity and availability issues can have significant operational consequences, especially for organizations relying on eComplaint for regulatory or legal case management. Attackers could also use this vector as a foothold for further attacks, such as uploading malicious files or triggering application errors. The impact is particularly critical for organizations handling sensitive or high-volume complaint data, where data integrity and system uptime are paramount.

Mitigation Recommendations

Organizations should upgrade OPEXUS eComplaint to version 10.1.0.0 or later where this vulnerability is addressed. In the absence of an immediate patch, implement strict access controls to restrict access to the 'DocumentUploadPub.aspx' endpoint, such as IP whitelisting or VPN-only access. Employ input validation and verify case numbers server-side to prevent unauthorized file uploads. Monitor file upload activity for anomalies, including unusual volume or unexpected file types. Implement storage quotas and automated cleanup policies to mitigate storage exhaustion risks. Conduct regular audits of uploaded files to detect unauthorized content. Additionally, consider deploying web application firewalls (WAFs) with custom rules to block unauthorized upload attempts. Educate users to report unexpected files appearing in cases promptly. Finally, maintain up-to-date backups to recover from potential data integrity issues caused by exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2026-03-16T20:57:29.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc1fb1e32a4fbe5fd8212f

Added to database: 3/19/2026, 4:09:21 PM

Last enriched: 3/26/2026, 7:28:59 PM

Last updated: 4/30/2026, 5:35:26 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses