Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8054: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenText™ XM Fax

0
High
VulnerabilityCVE-2025-8054cvecve-2025-8054cwe-22
Published: Thu Feb 19 2026 (02/19/2026, 22:21:22 UTC)
Source: CVE Database V5
Vendor/Project: OpenText™
Product: XM Fax

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in OpenText™ XM Fax allows Path Traversal.  The vulnerability could allow an attacker to arbitrarily disclose content of files on the local filesystem. This issue affects XM Fax: 24.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:29:53 UTC

Technical Analysis

CVE-2025-8054 is a path traversal vulnerability classified under CWE-22 affecting OpenText™ XM Fax version 24.2. The vulnerability stems from improper validation and limitation of pathname inputs, allowing an attacker to traverse directories beyond the intended restricted directory. This enables arbitrary disclosure of local filesystem files, potentially exposing sensitive configuration files, credentials, or other confidential data stored on the server hosting XM Fax. The vulnerability requires the attacker to have limited privileges (PR:L) but does not require user interaction or higher authentication levels. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required beyond limited (PR:L), no user interaction (UI:N), and high impact on confidentiality (C:H) with no impact on integrity or availability. The vulnerability is currently published with no known exploits in the wild, but the potential for data leakage is significant given the nature of the flaw. XM Fax is widely used in enterprise environments for secure fax communications, making this vulnerability a critical concern for organizations relying on this product for sensitive document transmission. The lack of a patch link suggests that a fix is either pending or not yet publicly released, emphasizing the need for interim mitigations.

Potential Impact

The primary impact of CVE-2025-8054 is the unauthorized disclosure of sensitive information stored on the local filesystem of systems running OpenText XM Fax 24.2. This can lead to exposure of confidential business documents, user credentials, configuration files, or other sensitive data, potentially facilitating further attacks such as privilege escalation or lateral movement within the network. Since the vulnerability can be exploited remotely over the network with limited privileges and no user interaction, it poses a significant risk to organizations worldwide. The confidentiality breach could result in regulatory compliance violations, intellectual property theft, and damage to organizational reputation. While integrity and availability are not directly impacted, the loss of confidentiality alone is critical in environments handling sensitive communications. The scope includes all instances of XM Fax 24.2 accessible over the network, especially those exposed to untrusted networks or insufficiently segmented internal networks.

Mitigation Recommendations

1. Immediately restrict network access to the OpenText XM Fax service to trusted internal networks only, using firewalls and network segmentation. 2. Implement strict access controls and least privilege principles for users and services interacting with XM Fax to minimize the risk of exploitation by low-privilege attackers. 3. Monitor system and application logs for unusual file access patterns or attempts to access unauthorized directories. 4. Disable or limit features that allow user-supplied input for file paths until a patch is available. 5. Engage with OpenText support to obtain or expedite patches or hotfixes addressing CVE-2025-8054. 6. Conduct a thorough review of sensitive files and credentials stored on XM Fax servers and rotate credentials if exposure is suspected. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect path traversal attempts targeting XM Fax. 8. Educate system administrators and security teams about this vulnerability and ensure incident response plans include steps for path traversal exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
OpenText
Date Reserved
2025-07-22T13:07:37.061Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69978f65d7880ec89b38454f

Added to database: 2/19/2026, 10:32:05 PM

Last enriched: 2/28/2026, 1:29:53 PM

Last updated: 4/6/2026, 4:53:24 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses