Skip to main content

CVE-2025-46732: CWE-285: Improper Authorization in OpenCTI-Platform opencti

Medium
VulnerabilityCVE-2025-46732cvecve-2025-46732cwe-285
Published: Fri Jul 18 2025 (07/18/2025, 15:05:11 UTC)
Source: CVE Database V5
Vendor/Project: OpenCTI-Platform
Product: opencti

Description

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.6.6, an IDOR vulnerability in the GrapQL `NotificationLineNotificationMarkReadMutation` and `NotificationLineNotificationDeleteMutation` mutations of OpenCTI allows an authenticated user to change the read status of a notification or delete a notification of another user in case he has knowledge of the UUID of the notification. When changing the read status of a notification, the user also receives the content of the notification they changed the read status of. Authenticated Users in OpenCTI can read, modify and delete notification of other users if they know the UUID of the notification. Version 6.6.6 fixes the issue.

AI-Powered Analysis

AILast updated: 07/18/2025, 15:31:31 UTC

Technical Analysis

CVE-2025-46732 is an improper authorization vulnerability (CWE-285) affecting versions of the OpenCTI platform prior to 6.6.6. OpenCTI is an open-source cyber threat intelligence platform used to manage threat intelligence knowledge and observables. The vulnerability exists in the GraphQL API mutations NotificationLineNotificationMarkReadMutation and NotificationLineNotificationDeleteMutation. Authenticated users can exploit an Insecure Direct Object Reference (IDOR) flaw by providing the UUID of a notification belonging to another user. This allows them to change the read status or delete notifications of other users without proper authorization checks. When changing the read status, the attacker also gains access to the content of the targeted notification, potentially exposing sensitive threat intelligence data. The vulnerability requires the attacker to be authenticated but does not require user interaction beyond sending crafted GraphQL mutation requests. The CVSS v3.1 base score is 5.4 (medium severity), reflecting low complexity of attack (AC:L), network attack vector (AV:N), privileges required (PR:L), no user interaction (UI:N), and limited confidentiality and integrity impact (C:L/I:L) with no availability impact (A:N). The issue was fixed in OpenCTI version 6.6.6 by adding proper authorization checks to ensure users can only modify or delete their own notifications. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations using OpenCTI versions prior to 6.6.6, this vulnerability poses a moderate risk to the confidentiality and integrity of cyber threat intelligence data. Attackers with valid user credentials can access notifications intended for other users, potentially exposing sensitive or strategic threat information. This could lead to unauthorized disclosure of internal threat assessments or intelligence sharing details, undermining trust and operational security. Additionally, the ability to delete notifications of other users may disrupt threat monitoring workflows and cause loss of critical alerting information. While the vulnerability does not allow full system compromise or availability disruption, the exposure of sensitive intelligence and interference with notification data can impact incident response and threat analysis capabilities. European organizations involved in cybersecurity operations, government CERTs, or private sector threat intelligence sharing communities are particularly at risk. The medium severity rating suggests that exploitation is feasible but requires authenticated access, limiting exposure to insider threats or compromised accounts.

Mitigation Recommendations

European organizations should immediately upgrade OpenCTI installations to version 6.6.6 or later, where the vulnerability is patched. Until upgrading, implement strict access controls and monitoring on user accounts to prevent unauthorized access. Enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Review and audit user permissions regularly to ensure least privilege principles are applied. Monitor GraphQL API usage logs for suspicious mutation requests that attempt to access or modify notifications not belonging to the authenticated user. Consider implementing Web Application Firewall (WAF) rules to detect and block anomalous GraphQL mutation patterns. Educate users about the importance of safeguarding their credentials and reporting suspicious activity. Finally, coordinate with OpenCTI community and vendors for any additional security advisories or patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-04-28T20:56:09.085Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687a653aa83201eaacf48a5f

Added to database: 7/18/2025, 3:16:10 PM

Last enriched: 7/18/2025, 3:31:31 PM

Last updated: 8/12/2025, 11:04:48 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats