Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8054: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenText™ XM Fax

0
High
VulnerabilityCVE-2025-8054cvecve-2025-8054cwe-22
Published: Thu Feb 19 2026 (02/19/2026, 22:21:22 UTC)
Source: CVE Database V5
Vendor/Project: OpenText™
Product: XM Fax

Description

CVE-2025-8054 is a high-severity path traversal vulnerability in OpenText™ XM Fax version 24. 2. It allows an attacker with limited privileges to read arbitrary files on the local filesystem by bypassing pathname restrictions. Exploitation does not require user interaction or authentication but does require some level of privileges on the system. The vulnerability impacts confidentiality by exposing sensitive files but does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using XM Fax 24. 2 should prioritize patching or applying mitigations to prevent unauthorized file disclosure. This vulnerability is particularly relevant to enterprises and government agencies relying on OpenText XM Fax for secure fax communications. Countries with significant OpenText customer bases and critical infrastructure deployments are at higher risk.

AI-Powered Analysis

AILast updated: 02/19/2026, 22:46:23 UTC

Technical Analysis

CVE-2025-8054 is a path traversal vulnerability classified under CWE-22 found in OpenText™ XM Fax version 24.2. The vulnerability arises from improper limitation of pathnames to restricted directories, allowing attackers to craft requests that traverse directories and access files outside the intended scope. This flaw enables an attacker to arbitrarily disclose contents of files on the local filesystem, potentially exposing sensitive information such as configuration files, credentials, or other confidential data. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L - low privileges), no user interaction (UI:N), and high impact on confidentiality (VC:H). The vulnerability does not impact integrity or availability. The scope remains unchanged (S:N), and the exploitability rating is medium (RE:M). No known exploits have been reported in the wild yet, but the potential for information disclosure is significant. The vulnerability affects only version 24.2 of XM Fax, a product used for secure fax transmission and management in enterprise environments. The issue was reserved in July 2025 and published in February 2026. The lack of patch links suggests that a fix may be forthcoming or in development.

Potential Impact

The primary impact of CVE-2025-8054 is unauthorized disclosure of sensitive information stored on systems running OpenText XM Fax 24.2. Attackers exploiting this vulnerability can read arbitrary files, which may include system configuration files, user credentials, encryption keys, or other confidential data. This breach of confidentiality can lead to further attacks such as privilege escalation, lateral movement, or data exfiltration. Since XM Fax is often deployed in enterprise and government environments for secure document transmission, exposure of sensitive fax data or system files could have serious operational and reputational consequences. The vulnerability does not directly affect system integrity or availability, but the information gained could facilitate more damaging attacks. Organizations worldwide using this product version are at risk, especially those with sensitive communications or regulatory compliance requirements. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability’s network accessibility and low complexity make it a significant threat once exploited.

Mitigation Recommendations

To mitigate CVE-2025-8054, organizations should first verify if they are running OpenText XM Fax version 24.2 and prioritize upgrading to a patched version once available from the vendor. Until a patch is released, implement strict network segmentation and firewall rules to restrict access to the XM Fax service only to trusted internal users and systems. Employ application-layer filtering or web application firewalls (WAFs) to detect and block path traversal attempts by monitoring for suspicious input patterns such as '../' sequences. Review and harden file system permissions to ensure the XM Fax service account has the minimum necessary access, preventing it from reading sensitive files outside its operational scope. Conduct regular audits and monitoring of file access logs for unusual activity indicative of exploitation attempts. Additionally, consider deploying intrusion detection systems (IDS) with signatures for path traversal attacks. Engage with OpenText support for guidance and subscribe to their security advisories to receive timely updates. Finally, educate administrators and security teams about this vulnerability to ensure rapid response and containment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
OpenText
Date Reserved
2025-07-22T13:07:37.061Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69978f65d7880ec89b38454f

Added to database: 2/19/2026, 10:32:05 PM

Last enriched: 2/19/2026, 10:46:23 PM

Last updated: 2/20/2026, 12:03:06 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats