We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-26621

OpenCTI vulnerable to Denial of Service through web hook



Description

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.

Reserved 2025-02-12 | Published 2025-05-19 | Updated 2025-05-19 | Assigner GitHub_M


HIGH: 7.6CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 6.5.2
affected

References

github.com/...pencti/security/advisories/GHSA-gq63-jm3h-374p

github.com/...pencti/security/advisories/GHSA-mf88-g2wq-p7qm

cve.org (CVE-2025-26621)

nvd.nist.gov (CVE-2025-26621)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-26621

Support options

Helpdesk Chat, Email, Knowledgebase