First published: Tue Feb 04 2025(Updated: )
Improper Validation of Specified Type of Input vulnerability in OpenText™ Content Management (Extended ECM) allows Parameter Injection. A bad actor with the required OpenText Content Management privileges (not root) could expose the vulnerability to carry out a remote code execution attack on the target system. This issue affects Content Management (Extended ECM): from 10.0 through 24.4 with WebReports module installed and enabled.
Credit: security@opentext.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenText Content Management | >=10.0<=24.4 |
Support articles, alerts & useful tools - OpenText™ Content Management - Remote code vulnerability discovered https://support.opentext.com/csm
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8125 has been classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2024-8125, it is recommended to update OpenText Content Management to the latest version that addresses this vulnerability.
CVE-2024-8125 affects OpenText Content Management versions from 10.0 to 24.4.
CVE-2024-8125 is categorized as an Improper Validation of Specified Type of Input vulnerability, enabling parameter injection.
CVE-2024-8125 can potentially be exploited by a bad actor with the necessary OpenText Content Management privileges, excluding root access.