Deserialization of Untrusted Data vulnerability in OpenText™ Directory Services allows Object Injection.  The vulnerability could lead to remote code execution, denial of service, or privilege escalation. This issue affects Directory Services: before 24.4.16, from 25.1 before 25.1.9, from 25.2 before 25.2.9, from 25.3 before 25.3.8, from 25.4 before 25.4.5, from 26.1 before 26.1.2.
History

Fri, 27 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in OpenText™ Directory Services allows Object Injection. The vulnerability could lead to remote code execution, denial of service, or privilege escalation. This issue affects Directory Services: from 10.5 through 26.1. Deserialization of Untrusted Data vulnerability in OpenText™ Directory Services allows Object Injection.  The vulnerability could lead to remote code execution, denial of service, or privilege escalation. This issue affects Directory Services: before 24.4.16, from 25.1 before 25.1.9, from 25.2 before 25.2.9, from 25.3 before 25.3.8, from 25.4 before 25.4.5, from 26.1 before 26.1.2.

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Opentext
Opentext directory Services
Vendors & Products Opentext
Opentext directory Services

Wed, 18 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in OpenText™ Directory Services allows Object Injection. The vulnerability could lead to remote code execution, denial of service, or privilege escalation. This issue affects Directory Services: from 10.5 through 26.1.
Title An Insecure Deserialization vulnerability has been discovered in OpenText™ Directory Services.
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 9.5, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/V:C/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: OpenText

Published: 2026-02-18T14:57:04.010Z

Updated: 2026-02-27T21:46:44.623Z

Reserved: 2026-02-17T15:58:22.563Z

Link: CVE-2025-15579

cve-icon Vulnrichment

Updated: 2026-02-18T18:19:59.980Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-18T16:22:28.290

Modified: 2026-02-27T22:16:22.617

Link: CVE-2025-15579

cve-icon Redhat

No data.