CVE-2026-1658 PUBLISHED

Content spoofing vulnerability discovered in OpenText™ Directory Services

Assigner: OpenText
Reserved: 29.01.2026 Published: 19.02.2026 Updated: 19.02.2026

User Interface (UI) Misrepresentation of Critical Information vulnerability in OpenText™ Directory Services allows Cache Poisoning. 

The vulnerability could be exploited by a bad actor to inject manipulated text into the OpenText application, potentially misleading users.

This issue affects Directory Services: from 20.4.1 through 25.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:A/V:D/RE:L/U:Clear
CVSS Score: 5.3

Product Status

Vendor OpenText™
Product Directory Services
Versions Default: unaffected
  • affected from 20.4.1 to 25.2 (incl.)

Solutions

https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0858517

Credits

  • Andrej Šimko of Accenture finder

References

Problem Types

  • CWE-451 User Interface (UI) Misrepresentation of Critical Information CWE

Impacts

  • CAPEC-141 Cache Poisoning