Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2026-32865 โ€” AI Deep Analysis Summary

CVSS 9.8 ยท Critical

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: OPEXUS eComplaint & eCASE leak verification codes in password reset responses. ๐Ÿ“‰ **Consequences**: Attackers can hijack accounts, reset passwords, and bypass security questions.โ€ฆ

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: **CWE-200** (Information Exposure). The system incorrectly includes sensitive verification tokens in the response payload during password reset flows. ๐Ÿ•ณ๏ธ

Q3Who is affected? (Versions/Components)

๐Ÿข **Affected**: **OPEXUS** products: eComplaint & eCASE. ๐Ÿ“ฆ **Version**: All versions **before 10.1.0.0**. If you are running older builds, you are at risk! โš ๏ธ

Q4What can hackers do? (Privileges/Data)

๐Ÿ‘ฎ **Attacker Actions**: Gain **Full Control** over user accounts. Reset passwords without the real user. Access sensitive case/complaint data. ๐Ÿ—๏ธ **Privileges**: High (C:H, I:H, A:H).

Q5Is exploitation threshold high? (Auth/Config)

๐Ÿ”“ **Threshold**: **LOW**. CVSS indicates **No Auth** required (PR:N) and **Low Complexity** (AC:L). No user interaction needed (UI:N). It's an open door! ๐Ÿšช

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ’ฃ **Public Exploit**: **No**. The `pocs` list is empty. However, the flaw is trivial to exploit manually. Wild exploitation is likely imminent due to simplicity. ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Self-Check**: Trigger a password reset for a test account. Inspect the HTTP response body. If you see a **verification code/token** in the JSON/HTML, you are vulnerable! ๐Ÿงช

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿฉน **Fix**: **Yes**. Upgrade to version **10.1.0.0** or later. The vendor has released a patch to stop leaking these tokens. ๐Ÿ“ฅ

Q9What if no patch? (Workaround)

๐Ÿšง **No Patch Workaround**: Monitor logs for password reset anomalies. Restrict access to the password reset endpoint via WAF. Force immediate password changes for high-privilege users. ๐Ÿ›‘

Q10Is it urgent? (Priority Suggestion)

๐Ÿ”ฅ **Urgency**: **CRITICAL**. CVSS Score is **9.1** (High). Exploitation is easy and requires no credentials. Patch immediately! โณ