{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22232","assignerOrgId":"9119a7d8-5eab-497f-8521-727c672e3725","state":"PUBLISHED","assignerShortName":"cisa-cg","dateReserved":"2026-01-06T21:51:53.790Z","datePublished":"2026-01-08T17:10:41.189Z","dateUpdated":"2026-01-08T17:51:05.746Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript in the \"A or SIC Number\" field within the Project Setup functionality. The JavaScript is executed whenever another user views the project. Fixed in OPEXUS eCASE Audit 11.14.2.0."}],"affected":[{"vendor":"OPEXUS","product":"eCASE Audit","defaultStatus":"unknown","versions":[{"version":"11.4.0","status":"affected","lessThan":"11.14.2.0","versionType":"custom"},{"version":"11.14.2.0","status":"unaffected"}]}],"problemTypes":[{"descriptions":[{"description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE","cweId":"CWE-79"}]}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","userInteraction":"ACTIVE","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","subIntegrityImpact":"NONE","vulnIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","vulnConfidentialityImpact":"LOW"}},{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"LOW","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-12-11T18:27:56.827345Z","id":"CVE-2026-22232","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"OPEXUS eCASE Audit Project Setup stored XSS","references":[{"name":"url","url":"https://docs.opexustech.com/docs/oig/audit/eCase_Audit_Release_Notes_11.14.2.0.pdf","tags":["release-notes"]},{"name":"url","url":"https://www.cve.org/CVERecord?id=CVE-2026-22232","tags":["vdb-entry"]},{"name":"url","url":"https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-01.json","tags":["government-resource","third-party-advisory"]}],"credits":[{"value":"Aaron M. Ramirez, Son Nguyen, Wesley Cuffee, United States Department of Justice","lang":"en"}],"datePublic":"2026-01-08T00:00:00.000Z","providerMetadata":{"orgId":"9119a7d8-5eab-497f-8521-727c672e3725","shortName":"cisa-cg","dateUpdated":"2026-01-08T17:10:41.189Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-08T17:50:56.350982Z","id":"CVE-2026-22232","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-08T17:51:05.746Z"}}]}}