CVE-2026-32865

Published: Mar 19, 2026 Last Modified: Mar 19, 2026
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,2
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
CRITICAL 9,8
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process.

200

Exposure of Sensitive Information to an Unauthorized Actor

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies: Mobile, Not Technology-Specific, Web Based
View CWE Details
640

Weak Password Recovery Mechanism for Forgotten Password

Incomplete
Common Consequences
Security Scopes Affected:
Access Control Availability Integrity Other
Potential Impacts:
Gain Privileges Or Assume Identity Dos: Resource Consumption (Other) Other
Applicable Platforms
All platforms may be affected
View CWE Details
https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025…
https://www.cve.org/CVERecord?id=CVE-2026-32865