← Volver a CVEs
CVE-2025-26621
HIGH7.6
Descripcion
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
Detalles CVE
Puntuacion CVSS v3.17.6
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado5/19/2025
Ultima modificacion8/6/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
citeum:opencti
Debilidades (CWE)
CWE-94CWE-1321
Referencias
https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-gq63-jm3h-374p(security-advisories@github.com)
https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm(security-advisories@github.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.