Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21887: CWE-918: Server-Side Request Forgery (SSRF) in OpenCTI-Platform opencti

0
High
VulnerabilityCVE-2026-21887cvecve-2026-21887cwe-918
Published: Thu Mar 12 2026 (03/12/2026, 17:00:43 UTC)
Source: CVE Database V5
Vendor/Project: OpenCTI-Platform
Product: opencti

Description

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to 6.8.16, the OpenCTI platform’s data ingestion feature accepts user-supplied URLs without validation and uses the Axios HTTP client with its default configuration (allowAbsoluteUrls: true). This allows attackers to craft requests to arbitrary endpoints, including internal services, because Axios will accept and process absolute URLs. This results in a semi-blind SSRF, as responses may not be fully visible but can still impact internal systems. This vulnerability is fixed in 6.8.16.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:14:09 UTC

Technical Analysis

CVE-2026-21887 is a Server-Side Request Forgery (SSRF) vulnerability identified in the OpenCTI-Platform, an open-source cyber threat intelligence management tool. The flaw exists in versions prior to 6.8.16 within the data ingestion component, which accepts user-supplied URLs without adequate validation. The platform uses the Axios HTTP client with its default setting (allowAbsoluteUrls: true), allowing absolute URLs to be processed. This configuration permits attackers with at least low-level privileges to craft requests targeting arbitrary endpoints, including internal network services that are typically inaccessible externally. The SSRF is semi-blind, meaning attackers may not receive full response data but can still cause the server to interact with internal systems, potentially leaking sensitive information or enabling further attacks. The vulnerability impacts confidentiality by exposing internal resources but does not affect data integrity or availability. The CVSS v3.1 score is 7.7 (high severity), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and a scope change. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to organizations relying on vulnerable OpenCTI versions. The issue was resolved in version 6.8.16 by implementing proper URL validation and restricting Axios configuration to prevent absolute URL requests.

Potential Impact

The primary impact of CVE-2026-21887 is on the confidentiality of internal systems and services accessible from the OpenCTI server. Attackers exploiting this SSRF vulnerability can make the server send requests to internal endpoints, potentially accessing sensitive data, metadata, or administrative interfaces not exposed externally. This can lead to information disclosure, reconnaissance of internal network topology, and possibly facilitate lateral movement or further exploitation within the victim's environment. Although the SSRF is semi-blind and does not directly compromise data integrity or availability, the exposure of internal services can be leveraged in multi-stage attacks. Organizations using OpenCTI for threat intelligence management may have sensitive operational data at risk. The vulnerability requires at least low privileges on the platform, so insider threats or compromised user accounts increase risk. The widespread use of OpenCTI in cybersecurity teams globally means that many organizations, especially those in critical infrastructure and government sectors, could be targeted. Failure to patch this vulnerability could result in unauthorized internal network access and data leakage.

Mitigation Recommendations

1. Upgrade OpenCTI-Platform to version 6.8.16 or later, where the vulnerability is fixed. 2. Restrict access to the data ingestion feature to trusted users only, minimizing the risk of malicious URL submissions. 3. Implement network segmentation and firewall rules to limit the OpenCTI server's ability to reach sensitive internal endpoints unnecessarily. 4. Monitor and log all outgoing HTTP requests from the OpenCTI server to detect unusual or unauthorized access attempts. 5. If upgrading immediately is not possible, consider disabling or restricting the data ingestion feature temporarily. 6. Conduct regular audits of user privileges within OpenCTI to ensure that only necessary users have access to features that accept external input. 7. Employ web application firewalls (WAFs) or proxy solutions that can detect and block SSRF patterns targeting internal resources. 8. Educate administrators and users about the risks of SSRF and the importance of validating URLs before ingestion.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T17:24:36.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b2ff142f860ef943d3c351

Added to database: 3/12/2026, 5:59:48 PM

Last enriched: 3/12/2026, 6:14:09 PM

Last updated: 3/12/2026, 8:07:11 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses