We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-24977

OpenCTI has remote code execution and sensitive secrets exposed through web hook



Description

OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` can execute commands on the underlying infrastructure where OpenCTI is hosted and can access internal server side secrets by misusing the web-hooks. Since the malicious user gets a root shell inside a container this opens up the the infrastructure environment for further attacks and exposures. Version 6.4.11 fixes the issue.

Reserved 2025-01-29 | Published 2025-05-05 | Updated 2025-05-05 | Assigner GitHub_M


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 6.4.11
affected

References

github.com/...pencti/security/advisories/GHSA-mf88-g2wq-p7qm

cve.org (CVE-2025-24977)

nvd.nist.gov (CVE-2025-24977)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-24977

Support options

Helpdesk Chat, Email, Knowledgebase