CVE-2025-26621

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*

History

06 Aug 2025, 17:54

Type Values Removed Values Added
First Time Citeum
Citeum opencti
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CPE cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*
References () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm - () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm - Not Applicable
References () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-gq63-jm3h-374p - () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-gq63-jm3h-374p - Vendor Advisory
CWE CWE-1321

19 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-19 16:15

Updated : 2025-08-06 17:54


NVD link : CVE-2025-26621

Mitre link : CVE-2025-26621


JSON object : View

Products Affected

citeum

  • opencti
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

CWE-94

Improper Control of Generation of Code ('Code Injection')