CVE-2026-32867 Overview
CVE-2026-32867 is a Broken Access Control vulnerability affecting OPEXUS eComplaint before version 10.1.0.0. The vulnerability allows an unauthenticated attacker to obtain or guess an existing case number and upload arbitrary files via the Portal/EEOC/DocumentUploadPub.aspx endpoint. This unauthorized file upload capability could result in users seeing unexpected files in cases, and uploading a large number of files could consume storage resources.
Critical Impact
Unauthenticated attackers can upload arbitrary files to existing case records, potentially tampering with case integrity and consuming storage resources through a publicly accessible document upload endpoint.
Affected Products
- OPEXUS eComplaint versions before 10.1.0.0
Discovery Timeline
- 2026-03-19 - CVE CVE-2026-32867 published to NVD
- 2026-03-19 - Last updated in NVD database
Technical Details for CVE-2026-32867
Vulnerability Analysis
This vulnerability is classified under CWE-425 (Direct Request / Forced Browsing), which describes a condition where an application fails to properly enforce authorization on resources that should be protected. In the case of OPEXUS eComplaint, the DocumentUploadPub.aspx endpoint within the Portal/EEOC directory lacks proper authentication controls, allowing unauthenticated users to submit file uploads directly to existing case records.
The vulnerability requires an attacker to either obtain or successfully guess a valid case number. Once a valid case number is identified, the attacker can upload arbitrary files that become associated with that case record. This represents a significant integrity concern as legitimate case files could be polluted with unauthorized documents, potentially affecting legal or compliance processes that rely on the case management system.
Root Cause
The root cause of this vulnerability lies in missing authentication controls on the DocumentUploadPub.aspx endpoint. The application fails to verify whether the user submitting the file upload request is properly authenticated and authorized to add documents to the specified case. This design flaw exposes the file upload functionality to any user who can access the endpoint and provide a valid case number parameter.
Attack Vector
The attack is network-based and can be executed remotely without authentication. An attacker would need to:
- Identify or enumerate valid case numbers within the eComplaint system
- Craft HTTP requests to the Portal/EEOC/DocumentUploadPub.aspx endpoint
- Submit file upload requests with the target case number
- Uploaded files would then appear within the victim's case records
The vulnerability could be exploited for various malicious purposes including case tampering, storage exhaustion through mass file uploads, or potentially hosting malicious content within the application's storage infrastructure.
Detection Methods for CVE-2026-32867
Indicators of Compromise
- Unexpected or unauthorized files appearing in case records that were not uploaded by legitimate users
- Unusual spike in file upload activity to the DocumentUploadPub.aspx endpoint
- HTTP POST requests to /Portal/EEOC/DocumentUploadPub.aspx from unauthenticated sessions
- Storage consumption anomalies indicating potential abuse of the upload functionality
Detection Strategies
- Monitor web server access logs for requests to Portal/EEOC/DocumentUploadPub.aspx from external or unauthenticated sources
- Implement alerting on high-volume file upload activity to the vulnerable endpoint
- Review case records for files with unexpected creation timestamps or metadata inconsistencies
- Deploy Web Application Firewall (WAF) rules to detect and block unauthorized upload attempts
Monitoring Recommendations
- Enable detailed logging for the eComplaint application's file upload functionality
- Configure SIEM correlation rules to identify patterns of case number enumeration attempts
- Monitor storage utilization trends to detect potential resource exhaustion attacks
- Implement file integrity monitoring on case document storage directories
How to Mitigate CVE-2026-32867
Immediate Actions Required
- Upgrade OPEXUS eComplaint to version 10.1.0.0 or later immediately
- Implement network-level access restrictions to the Portal/EEOC/DocumentUploadPub.aspx endpoint until patching is complete
- Review recent file uploads for unauthorized or suspicious documents
- Consider temporarily disabling the public document upload functionality if business operations permit
Patch Information
Organizations should upgrade to OPEXUS eComplaint version 10.1.0.0 or later, which addresses this vulnerability. For detailed patch information and remediation guidance, refer to the CISA CSAF Document and the official CVE Record.
Workarounds
- Restrict access to the DocumentUploadPub.aspx endpoint via web server configuration or network access control lists
- Implement additional authentication layers using a reverse proxy or WAF in front of the vulnerable endpoint
- Enable rate limiting on file upload endpoints to mitigate storage exhaustion attacks
- Deploy IP-based access restrictions to limit upload functionality to trusted networks only
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

