Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3266: CWE-862 Missing Authorization in OpenText™ Filr

0
High
VulnerabilityCVE-2026-3266cvecve-2026-3266cwe-862
Published: Tue Mar 03 2026 (03/03/2026, 22:28:52 UTC)
Source: CVE Database V5
Vendor/Project: OpenText™
Product: Filr

Description

Missing Authorization vulnerability in OpenText™ Filr allows Authentication Bypass. The vulnerability could allow unauthenticated users to get XSRF token and do RPC with carefully crafted programs. This issue affects Filr: through 25.1.2.

AI-Powered Analysis

AILast updated: 03/03/2026, 23:02:37 UTC

Technical Analysis

CVE-2026-3266 is a missing authorization vulnerability classified under CWE-862 affecting OpenText™ Filr versions through 25.1.2. The flaw allows unauthenticated attackers to bypass authentication mechanisms by obtaining an XSRF (Cross-Site Request Forgery) token, which is typically used to prevent unauthorized commands from being transmitted. By leveraging this token, attackers can perform RPC calls with carefully crafted programs, effectively gaining unauthorized access to Filr’s functionalities. The vulnerability arises because the system does not properly verify authorization before granting access to sensitive RPC endpoints, allowing attackers to execute actions without valid credentials. The CVSS 4.0 score of 8.3 reflects a high severity, with network attack vector, high attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is significant as attackers can potentially access, modify, or disrupt data and services managed by Filr. Although no public exploits are currently known, the vulnerability’s nature and severity make it a critical concern for organizations relying on OpenText Filr for file sharing and collaboration. The lack of a patch link indicates that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

The vulnerability poses a serious risk to organizations using OpenText Filr by enabling unauthorized access to sensitive files and collaboration resources. Attackers exploiting this flaw can bypass authentication, potentially leading to data breaches, unauthorized data modification, or disruption of file sharing services. This can compromise confidentiality by exposing sensitive information, integrity by allowing unauthorized changes, and availability by disrupting normal operations. Given Filr’s use in enterprise environments for secure file sharing, exploitation could lead to significant operational and reputational damage. The absence of required privileges and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if the vulnerability is exposed to the internet or untrusted networks. Organizations may face regulatory and compliance consequences if sensitive data is compromised due to this vulnerability.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network segmentation and firewall rules to restrict access to OpenText Filr servers only to trusted internal networks and users. Employ Web Application Firewalls (WAFs) with custom rules to detect and block anomalous RPC calls and suspicious request patterns that could indicate exploitation attempts. Monitor logs for unusual access patterns, especially unauthenticated requests attempting to retrieve XSRF tokens or perform RPC actions. Disable or limit RPC functionality if feasible, or apply additional authentication layers such as VPN or IP whitelisting to reduce exposure. Educate administrators and users about the vulnerability and enforce strong access controls and multi-factor authentication on related systems. Once a patch is available, prioritize its deployment and validate the fix through penetration testing. Regularly update and audit security configurations to prevent similar authorization bypass issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
OpenText
Date Reserved
2026-02-26T14:50:44.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a76534d1a09e29cb81f9b7

Added to database: 3/3/2026, 10:48:20 PM

Last enriched: 3/3/2026, 11:02:37 PM

Last updated: 3/4/2026, 8:12:09 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses