OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
History

Wed, 06 Aug 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Citeum
Citeum opencti
Weaknesses CWE-1321
CPEs cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*
Vendors & Products Citeum
Citeum opencti

Mon, 19 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 May 2025 16:15:00 +0000

Type Values Removed Values Added
Description OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
Title OpenCTI vulnerable to Denial of Service through web hook
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-05-19T18:01:05.372Z

Reserved: 2025-02-12T14:51:02.719Z

Link: CVE-2025-26621

cve-icon Vulnrichment

Updated: 2025-05-19T17:59:06.084Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-19T16:15:28.560

Modified: 2025-08-06T17:54:26.333

Link: CVE-2025-26621

cve-icon Redhat

No data.