{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1658","assignerOrgId":"f81092c5-7f14-476d-80dc-24857f90be84","state":"PUBLISHED","assignerShortName":"OpenText","dateReserved":"2026-01-29T20:02:02.908Z","datePublished":"2026-02-19T22:40:33.406Z","dateUpdated":"2026-03-02T15:56:48.806Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Directory Services","vendor":"OpenText™","versions":[{"lessThanOrEqual":"25.2","status":"affected","version":"20.4.1","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Andrej Šimko of Accenture"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"User Interface (UI) Misrepresentation of Critical Information vulnerability in OpenText™ Directory Services allows Cache Poisoning.&nbsp;\n\n<span style=\"background-color: rgb(255, 255, 255);\">The vulnerability could be exploited by a bad actor to inject manipulated text into the OpenText application, potentially misleading users.</span>\n\n<p>This issue affects Directory Services: from 20.4.1 through 25.2.</p>"}],"value":"User Interface (UI) Misrepresentation of Critical Information vulnerability in OpenText™ Directory Services allows Cache Poisoning. \n\nThe vulnerability could be exploited by a bad actor to inject manipulated text into the OpenText application, potentially misleading users.\n\nThis issue affects Directory Services: from 20.4.1 through 25.2."}],"impacts":[{"capecId":"CAPEC-141","descriptions":[{"lang":"en","value":"CAPEC-141 Cache Poisoning"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NO","Recovery":"AUTOMATIC","Safety":"NEGLIGIBLE","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":5.3,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"CLEAR","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:A/V:D/RE:L/U:Clear","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-451","description":"CWE-451 User Interface (UI) Misrepresentation of Critical Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f81092c5-7f14-476d-80dc-24857f90be84","shortName":"OpenText","dateUpdated":"2026-02-19T22:40:33.406Z"},"references":[{"url":"https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0858517"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<a target=\"_blank\" rel=\"nofollow\" href=\"https://support.opentext.com/csm?id=ot_kb_unauthenticated&amp;sysparm_article=KB0858517\">https://support.opentext.com/csm?id=ot_kb_unauthenticated&amp;sysparm_article=KB0858517</a><br>"}],"value":"https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0858517"}],"source":{"discovery":"UNKNOWN"},"title":"Content spoofing vulnerability discovered in OpenText™ Directory Services","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-02T15:56:36.298446Z","id":"CVE-2026-1658","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-02T15:56:48.806Z"}}]}}