CVE-2026-1658

User Interface (UI) Misrepresentation of Critical Information vulnerability in OpenText™ Directory Services allows Cache Poisoning.  The vulnerability could be exploited by a bad actor to inject manipulated text into the OpenText application, potentially misleading users. This issue affects Directory Services: from 20.4.1 through 25.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opentext:directory_services:*:*:*:*:*:*:*:*

History

26 Feb 2026, 02:48

Type Values Removed Values Added
Summary
  • (es) La vulnerabilidad de Representación Errónea de Información Crítica en la Interfaz de Usuario (IU) en OpenText™ Directory Services permite el Envenenamiento de Caché. La vulnerabilidad podría ser explotada por un actor malicioso para inyectar texto manipulado en la aplicación OpenText, lo que podría engañar a los usuarios. Este problema afecta a Directory Services: desde la 20.4.1 hasta la 25.2.
CPE cpe:2.3:a:opentext:directory_services:*:*:*:*:*:*:*:*
References () https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0858517 - () https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0858517 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Opentext
Opentext directory Services

19 Feb 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-19 23:16

Updated : 2026-02-26 02:48


NVD link : CVE-2026-1658

Mitre link : CVE-2026-1658

CVE.ORG link : CVE-2026-1658


JSON object : View

Products Affected

opentext

  • directory_services
CWE
CWE-451

User Interface (UI) Misrepresentation of Critical Information