ATIPXpress PAL Release Notes 26.1.2.0

Prev Next

Product Enhancements

1.1 Casepoint Rebranding

#ID 1416508

All references for Opexus have been updated to Casepoint across the system, along with the copyright year. This is a cosmetic change with no impact on functionality.

1.2 RoboHelp to Doc. 360 KB Migration

#ID 1365176

A Smarter, Better Resource Center - Now Live!

We are delighted to announce that our legacy Resource Center has been successfully migrated to a new, modern, and feature-rich Knowledge Base - marking an exciting step forward in our commitment to continuously improving your experience.

You may now access all resources and Knowledge Base articles at our new location: šŸ”— https://guide.casepoint.com/resource-center/

Please be informed that the previous link (https://docs.opexustech.com/docs/resourcecenter/) will soon be unavailable. We encourage you to save the new link for future access.

NOTE: If you experience any difficulty accessing the new link, kindly request your IT or support team to whitelist guide.casepoint.com to ensure seamless access.

1.3 Complete French Translations

#ID 1313883

French language support has been added, providing translated field labels and system messages to improve accessibility for French-speaking users. Users can now view supported fields and messages in French for a more localized experience.

1.4 Enable System Directory Auto-creation

#ID 1369563

We're introducing an automated directory creation feature that eliminates the need for manual folder setup across PAL and PAL Config environments. The system will now automatically generate all required directory structures when triggered by key events such as case creation, project initiation, user onboarding, or migration.

1.5 VAPT Agency Vulnerability

#ID 1370204

This feature ensures all restricted URLs in PAL enforce proper server-side authentication and block unauthorised access.  

Security Updates

We’ve made the following security updates:

ID

Description

1439813

A Time-Based Blind SQL Injection vulnerability has been fixed and secured to prevent SQL injection payloads from being executed. Input validation and parameterized queries have been applied to eliminate the injection vector.