path and then download the specified file from the system by requesting the
stored document ID.
This issue affects Flipper: 3.1.2.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0850531
Workaround
No workaround given by the vendor.
Mon, 20 Oct 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 20 Oct 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | External Control of File Name or Path vulnerability in opentext Flipper allows Path Traversal. The vulnerability could allow a user to submit a stored local file path and then download the specified file from the system by requesting the stored document ID. This issue affects Flipper: 3.1.2. | |
Title | External Control of File path vulnerability has been discovered on Openext Flipper. | |
Weaknesses | CWE-73 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: OpenText
Published:
Updated: 2025-10-20T20:16:11.991Z
Reserved: 2025-07-22T13:06:35.332Z
Link: CVE-2025-8048

Updated: 2025-10-20T20:16:06.946Z

Status : Received
Published: 2025-10-20T20:15:38.007
Modified: 2025-10-20T20:15:38.007
Link: CVE-2025-8048

No data.

No data.