The vulnerability could be exploited by a bad actor to inject manipulated text into the OpenText application, potentially misleading users.
This issue affects Directory Services: from 20.4.1 through 25.2.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0858517
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opentext
Opentext directory Services |
|
| Vendors & Products |
Opentext
Opentext directory Services |
Thu, 19 Feb 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | User Interface (UI) Misrepresentation of Critical Information vulnerability in OpenText™ Directory Services allows Cache Poisoning. The vulnerability could be exploited by a bad actor to inject manipulated text into the OpenText application, potentially misleading users. This issue affects Directory Services: from 20.4.1 through 25.2. | |
| Title | Content spoofing vulnerability discovered in OpenText™ Directory Services | |
| Weaknesses | CWE-451 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OpenText
Published:
Updated: 2026-02-19T22:40:33.406Z
Reserved: 2026-01-29T20:02:02.908Z
Link: CVE-2026-1658
No data.
Status : Awaiting Analysis
Published: 2026-02-19T23:16:15.960
Modified: 2026-02-20T13:49:47.623
Link: CVE-2026-1658
No data.
OpenCVE Enrichment
Updated: 2026-02-20T09:53:39Z