OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
References
Link | Resource |
---|---|
https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-gq63-jm3h-374p | Vendor Advisory |
https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm | Not Applicable |
Configurations
History
06 Aug 2025, 17:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Citeum
Citeum opencti |
|
CWE | CWE-1321 | |
CPE | cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:* | |
References | () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-gq63-jm3h-374p - Vendor Advisory | |
References | () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm - Not Applicable |
21 May 2025, 20:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-19 16:15
Updated : 2025-08-06 17:54
NVD link : CVE-2025-26621
Mitre link : CVE-2025-26621
CVE.ORG link : CVE-2025-26621
JSON object : View
Products Affected
citeum
- opencti