CVE-2025-26621

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*

History

06 Aug 2025, 17:54

Type Values Removed Values Added
First Time Citeum
Citeum opencti
CWE CWE-1321
CPE cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*
References () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-gq63-jm3h-374p - () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-gq63-jm3h-374p - Vendor Advisory
References () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm - () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm - Not Applicable

21 May 2025, 20:25

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-19 16:15

Updated : 2025-08-06 17:54


NVD link : CVE-2025-26621

Mitre link : CVE-2025-26621

CVE.ORG link : CVE-2025-26621


JSON object : View

Products Affected

citeum

  • opencti
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')