CVE-2025-26621: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenCTI-Platform opencti
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-26621 is a high-severity vulnerability affecting versions of the OpenCTI platform prior to 6.5.2. OpenCTI is an open-source cyber threat intelligence management platform that allows users to organize and analyze threat data. The vulnerability arises from improper control over code generation (CWE-94), specifically in the management of webhook customizations. Users with the 'manage customizations' capability can edit webhooks that execute arbitrary JavaScript code. This flaw enables an attacker with such privileges to perform prototype pollution attacks on the Node.js server running the OpenCTI frontend. Prototype pollution is a technique that manipulates the prototype of base objects in JavaScript, potentially altering application behavior and causing denial of service (DoS) by making the server unavailable. The vulnerability does not require user interaction but does require high privileges (manage customizations). The CVSS 3.1 score is 7.6 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, scope change, no confidentiality impact, limited integrity impact, and high availability impact. The issue was fixed in version 6.5.2 of OpenCTI. No known exploits are reported in the wild yet, but the potential for DoS and integrity compromise in a critical threat intelligence platform is significant. This vulnerability could disrupt the availability of OpenCTI services, impacting organizations relying on it for cyber threat intelligence operations.
Potential Impact
For European organizations using OpenCTI, this vulnerability poses a significant risk to the availability and integrity of their cyber threat intelligence infrastructure. Since OpenCTI is used to manage and analyze threat data, a denial of service attack could interrupt threat monitoring, delay incident response, and reduce situational awareness. This disruption could increase the window of exposure to other cyber threats. Additionally, the integrity impact, while limited, could allow malicious modifications to webhook behavior, potentially leading to inaccurate threat data or further exploitation. Organizations in sectors with high reliance on threat intelligence platforms—such as government agencies, critical infrastructure operators, financial institutions, and large enterprises—may face operational and security risks if this vulnerability is exploited. The requirement for high privileges limits the attack surface to insiders or compromised accounts, but insider threats or privilege escalation scenarios could enable exploitation. The absence of known exploits in the wild provides a window for proactive patching and mitigation.
Mitigation Recommendations
European organizations should immediately upgrade OpenCTI to version 6.5.2 or later to remediate this vulnerability. Until upgrading, strict access controls must be enforced to limit the 'manage customizations' capability to trusted administrators only. Implement monitoring and alerting on webhook configuration changes to detect unauthorized modifications. Conduct regular audits of user privileges and webhook configurations. Employ runtime application self-protection (RASP) or Web Application Firewall (WAF) rules to detect and block suspicious JavaScript execution patterns related to prototype pollution. Additionally, segregate the OpenCTI frontend server in a secure network segment with limited access to reduce exposure. Organizations should also review logs for unusual activity indicative of prototype pollution attempts or DoS conditions. Finally, incorporate this vulnerability into incident response plans to ensure rapid detection and remediation if exploitation is suspected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2025-26621: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenCTI-Platform opencti
Description
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.5.2, any user with the capability manage customizations can edit webhook that will execute javascript code. This can be abused to cause a denial of service attack by prototype pollution, making the node js server running the OpenCTI frontend become unavailable. Version 6.5.2 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-26621 is a high-severity vulnerability affecting versions of the OpenCTI platform prior to 6.5.2. OpenCTI is an open-source cyber threat intelligence management platform that allows users to organize and analyze threat data. The vulnerability arises from improper control over code generation (CWE-94), specifically in the management of webhook customizations. Users with the 'manage customizations' capability can edit webhooks that execute arbitrary JavaScript code. This flaw enables an attacker with such privileges to perform prototype pollution attacks on the Node.js server running the OpenCTI frontend. Prototype pollution is a technique that manipulates the prototype of base objects in JavaScript, potentially altering application behavior and causing denial of service (DoS) by making the server unavailable. The vulnerability does not require user interaction but does require high privileges (manage customizations). The CVSS 3.1 score is 7.6 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, scope change, no confidentiality impact, limited integrity impact, and high availability impact. The issue was fixed in version 6.5.2 of OpenCTI. No known exploits are reported in the wild yet, but the potential for DoS and integrity compromise in a critical threat intelligence platform is significant. This vulnerability could disrupt the availability of OpenCTI services, impacting organizations relying on it for cyber threat intelligence operations.
Potential Impact
For European organizations using OpenCTI, this vulnerability poses a significant risk to the availability and integrity of their cyber threat intelligence infrastructure. Since OpenCTI is used to manage and analyze threat data, a denial of service attack could interrupt threat monitoring, delay incident response, and reduce situational awareness. This disruption could increase the window of exposure to other cyber threats. Additionally, the integrity impact, while limited, could allow malicious modifications to webhook behavior, potentially leading to inaccurate threat data or further exploitation. Organizations in sectors with high reliance on threat intelligence platforms—such as government agencies, critical infrastructure operators, financial institutions, and large enterprises—may face operational and security risks if this vulnerability is exploited. The requirement for high privileges limits the attack surface to insiders or compromised accounts, but insider threats or privilege escalation scenarios could enable exploitation. The absence of known exploits in the wild provides a window for proactive patching and mitigation.
Mitigation Recommendations
European organizations should immediately upgrade OpenCTI to version 6.5.2 or later to remediate this vulnerability. Until upgrading, strict access controls must be enforced to limit the 'manage customizations' capability to trusted administrators only. Implement monitoring and alerting on webhook configuration changes to detect unauthorized modifications. Conduct regular audits of user privileges and webhook configurations. Employ runtime application self-protection (RASP) or Web Application Firewall (WAF) rules to detect and block suspicious JavaScript execution patterns related to prototype pollution. Additionally, segregate the OpenCTI frontend server in a secure network segment with limited access to reduce exposure. Organizations should also review logs for unusual activity indicative of prototype pollution attempts or DoS conditions. Finally, incorporate this vulnerability into incident response plans to ensure rapid detection and remediation if exploitation is suspected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-02-12T14:51:02.719Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb511
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 5:02:42 PM
Last updated: 7/30/2025, 4:08:04 PM
Views: 15
Related Threats
CVE-2025-8081: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in elemntor Elementor Website Builder – More Than Just a Page Builder
MediumCVE-2025-6253: CWE-862 Missing Authorization in uicore UiCore Elements – Free Elementor widgets and templates
HighCVE-2025-3892: CWE-250: Execution with Unnecessary Privileges in Axis Communications AB AXIS OS
MediumCVE-2025-30027: CWE-1287: Improper Validation of Specified Type of Input in Axis Communications AB AXIS OS
MediumCVE-2025-7622: CWE-918: Server-Side Request Forgery (SSRF) in Axis Communications AB AXIS Camera Station Pro
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.