Impact
The vulnerability is a User Interface (UI) Misrepresentation of Critical Information that permits cache poisoning by injecting manipulated text into the OpenText application. The manipulation can mislead users into believing displayed information is accurate, potentially causing them to act on false or malicious data.
Affected Systems
Affected systems are OpenText Directory Services versions 20.4.1 through 25.2, all releases in that range contain the flaw in UI components that render text.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate risk, and the EPSS score of less than 1% indicates a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote delivery of crafted input to the UI, as the description discusses injection of manipulated text; this inference suggests no privileged access is required for exploitation.
OpenCVE Enrichment