CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
3Description
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to 6.9.5, the safeEjs.ts file does not properly sanitize EJS templates. Users with the Manage customization capability can run arbitrary JavaScript in the context of the OpenCTI platform process during notifier template execution. This vulnerability is fixed in 6.9.5.
Analysis
Server-Side Template Injection in OpenCTI platform versions before 6.9.5 allows authenticated administrators with 'Manage customization' capability to execute arbitrary JavaScript during notifier template processing. The vulnerability stems from improper EJS template sanitization in safeEjs.ts, enabling attackers to achieve remote code execution with platform process privileges. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all OpenCTI deployments and document current versions; restrict 'Manage customization' role assignments to essential personnel only and audit recent role changes. Within 7 days: Contact OpenCTI vendor for patch availability timeline and interim build; implement strict access controls limiting customization capability to offline or isolated environments if version 6.9.5 or later is unavailable. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-20972