We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
Reserved 2025-02-12 | Published 2025-05-19 | Updated 2025-05-19 | Assigner GitHub_MCWE-94: Improper Control of Generation of Code ('Code Injection')
github.com/...pencti/security/advisories/GHSA-gq63-jm3h-374p
github.com/...pencti/security/advisories/GHSA-mf88-g2wq-p7qm
Support options