Cyber Posture

CVE-2026-22230

High

Published: 08 January 2026

Published
08 January 2026
Modified
26 January 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
EPSS Score 0.0002 6.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22230 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Opexustech Ecase Audit. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-863

Periodic review and update of procedures reduces incorrect authorization implementations over time.

addresses: CWE-863

Supervision identifies cases where authorization logic incorrectly permits unauthorized actions.

addresses: CWE-863

Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.

addresses: CWE-863

The authorization process and usage restrictions help prevent incorrect authorization for remote access types.

addresses: CWE-863

Establishing configuration and connection requirements helps ensure correct rather than incorrect authorization for wireless access.

addresses: CWE-863

Establishing connection authorization processes for mobile devices helps ensure authorization decisions are correctly implemented rather than incorrect.

addresses: CWE-863

Monitoring account use, notifying on changes, and reviewing accounts for compliance corrects incorrect authorization assignments.

addresses: CWE-863

Ensures authorization decisions for external system use are correctly implemented and enforced.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Bypassing admin-enforced client-side controls via JS/HTTP manipulation enables privilege escalation (T1068) and exploitation of the web application (T1190).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaScript or craft HTTP requests to access functions or buttons that have been disabled or blocked by an administrator. Fixed in eCASE Platform 11.14.1.0.

Deeper analysisAI

CVE-2026-22230 is a vulnerability in the OPEXUS eCASE Audit component that enables an authenticated attacker to modify client-side JavaScript or craft HTTP requests to access functions or buttons disabled or blocked by an administrator. This issue, tied to CWE-863, carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L) and was published on 2026-01-08. The vulnerability is addressed in eCASE Platform version 11.14.1.0.

An attacker requires only low-privilege authenticated access (PR:L) over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Exploitation can result in high confidentiality impact (C:H), such as unauthorized access to sensitive data via bypassed controls, alongside low integrity (I:L) and availability (A:L) effects, potentially allowing minor unauthorized modifications or disruptions.

Vendor release notes for eCASE Platform 11.14.1.0 document the fix (https://docs.opexustech.com/docs/eCase/11.14.X/eCASE_Release_Notes_11.14.1.0.pdf). Further details appear in the CISA advisory (https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-008-01.json) and the official CVE record (https://www.cve.org/CVERecord?id=CVE-2026-22230), recommending upgrades to mitigate the risks.

Details

CWE(s)

Affected Products

opexustech
ecase audit
≤ 11.14.1.0

CVEs Like This One

CVE-2024-53553Same vendor: Opexustech
CVE-2025-62586Same vendor: Opexustech
CVE-2025-30093Shared CWE-863
CVE-2026-41191Shared CWE-863
CVE-2026-32101Shared CWE-863
CVE-2026-32267Shared CWE-863
CVE-2026-25859Shared CWE-863
CVE-2025-21556Shared CWE-863
CVE-2026-42426Shared CWE-863
CVE-2026-25741Shared CWE-863

References