OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
References
Configurations
No configuration.
History
21 May 2025, 20:25
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-19 16:15
Updated : 2025-05-21 20:25
NVD link : CVE-2025-26621
Mitre link : CVE-2025-26621
CVE.ORG link : CVE-2025-26621
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')