Untriaged
Permalink
CVE-2026-32869
5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
OPEXUS eComplaint and eCASE XSS via Name of Organization field
OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of the "Name of Organization" field when filling out case information. An authenticated attacker can inject an XSS payload which is executed in the context of a victim's session when they visit the case information page.
Affected products
eCASE
- <10.2.0.0
- ==10.2.0.0
eComplaint
- <10.2.0.0
- ==10.2.0.0
Matching in nixpkgs
pkgs.haskellPackages.titlecase
Convert English Words to Title Case
pkgs.python312Packages.titlecase
Python library to capitalize strings as specified by the New York Times
pkgs.python313Packages.titlecase
Python library to capitalize strings as specified by the New York Times
pkgs.python314Packages.titlecase
Python library to capitalize strings as specified by the New York Times
Package maintainers
-
@peti Peter Simons <simons@cryp.to>