External Control of File Name or Path vulnerability in opentext Flipper allows Path Traversal. The vulnerability could allow a user to submit a stored local file
path and then download the specified file from the system by requesting the
stored document ID.
This issue affects Flipper: 3.1.2.
References
| Link | Resource |
|---|---|
| https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0850531 | Vendor Advisory |
Configurations
History
28 Oct 2025, 16:12
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0850531 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:opentext:flipper:3.1.2:*:*:*:*:*:*:* | |
| First Time |
Opentext flipper
Opentext |
20 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-20 20:15
Updated : 2025-10-28 16:12
NVD link : CVE-2025-8048
Mitre link : CVE-2025-8048
CVE.ORG link : CVE-2025-8048
JSON object : View
Products Affected
opentext
- flipper
CWE
CWE-73
External Control of File Name or Path
