Opencti

8 CVEs product

Monthly

CVE-2026-21886 MEDIUM This Month

OpenCTI versions prior to 6.9.1 contain an authorization bypass vulnerability in the GraphQL mutation 'IndividualDeletionDeleteMutation' that allows authenticated users to delete arbitrary unrelated objects such as analysis reports, not just the intended individual entities. The vulnerability stems from insufficient input validation in the API layer, enabling a user with basic mutation privileges to escalate their impact beyond intended scope. With a CVSS score of 6.5 and authenticated access requirement, this represents a moderate but actionable availability risk for organizations managing threat intelligence with OpenCTI.

Authentication Bypass Opencti
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2020-37044 MEDIUM POC This Month

OpenCTI 3.3.1 is vulnerable to a reflected cross-site scripting (XSS) attack via the /graphql endpoint. An attacker can inject arbitrary JavaScript code by sending a crafted GET request with a malicious payload in the query string, leading to execution of JavaScript in the victim's browser. [CVSS 5.4 MEDIUM]

Linux Windows XSS Opencti
NVD GitHub Exploit-DB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2020-37041 HIGH POC This Week

OpenCTI 3.3.1 is vulnerable to a directory traversal attack via the static/css endpoint. An unauthenticated attacker can read arbitrary files from the filesystem by sending crafted GET requests with path traversal sequences (e.g., '../') in the URL. [CVSS 7.5 HIGH]

Linux Windows Path Traversal Opencti
NVD GitHub Exploit-DB
CVSS 3.1
7.5
EPSS
0.4%
CVE-2025-61782 MEDIUM PATCH This Month

Opencti versions up to 6.8.3 is affected by url redirection to untrusted site (open redirect) (CVSS 5.4).

Open Redirect Opencti
NVD GitHub
CVSS 3.1
5.4
EPSS
0.1%
CVE-2025-61781 HIGH This Week

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.8.1, the GraphQL mutation "WorkspacePopoverDeletionMutation" allows users to delete workspace-related objects such as dashboards and investigation cases. [CVSS 7.1 HIGH]

Authentication Bypass Opencti
NVD GitHub
CVSS 3.1
7.1
EPSS
0.1%
CVE-2025-26621 HIGH This Month

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Code Injection Denial Of Service Opencti
NVD GitHub
CVSS 3.1
7.6
EPSS
0.7%
CVE-2025-24977 CRITICAL Act Now

OpenCTI is an open cyber threat intelligence (CTI) platform. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Code Injection Opencti
NVD GitHub
CVSS 3.1
9.1
EPSS
0.5%
CVE-2025-24887 MEDIUM This Month

OpenCTI is an open-source cyber threat intelligence platform. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Opencti
NVD GitHub
CVSS 3.1
6.3
EPSS
0.2%
CVE-2026-21886
EPSS 0% CVSS 6.5
MEDIUM This Month

OpenCTI versions prior to 6.9.1 contain an authorization bypass vulnerability in the GraphQL mutation 'IndividualDeletionDeleteMutation' that allows authenticated users to delete arbitrary unrelated objects such as analysis reports, not just the intended individual entities. The vulnerability stems from insufficient input validation in the API layer, enabling a user with basic mutation privileges to escalate their impact beyond intended scope. With a CVSS score of 6.5 and authenticated access requirement, this represents a moderate but actionable availability risk for organizations managing threat intelligence with OpenCTI.

Authentication Bypass Opencti
NVD GitHub VulDB
CVE-2020-37044
EPSS 0% CVSS 5.4
MEDIUM POC This Month

OpenCTI 3.3.1 is vulnerable to a reflected cross-site scripting (XSS) attack via the /graphql endpoint. An attacker can inject arbitrary JavaScript code by sending a crafted GET request with a malicious payload in the query string, leading to execution of JavaScript in the victim's browser. [CVSS 5.4 MEDIUM]

Linux Windows XSS +1
NVD GitHub Exploit-DB
CVE-2020-37041
EPSS 0% CVSS 7.5
HIGH POC This Week

OpenCTI 3.3.1 is vulnerable to a directory traversal attack via the static/css endpoint. An unauthenticated attacker can read arbitrary files from the filesystem by sending crafted GET requests with path traversal sequences (e.g., '../') in the URL. [CVSS 7.5 HIGH]

Linux Windows Path Traversal +1
NVD GitHub Exploit-DB
CVE-2025-61782
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Opencti versions up to 6.8.3 is affected by url redirection to untrusted site (open redirect) (CVSS 5.4).

Open Redirect Opencti
NVD GitHub
CVE-2025-61781
EPSS 0% CVSS 7.1
HIGH This Week

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.8.1, the GraphQL mutation "WorkspacePopoverDeletionMutation" allows users to delete workspace-related objects such as dashboards and investigation cases. [CVSS 7.1 HIGH]

Authentication Bypass Opencti
NVD GitHub
CVE-2025-26621
EPSS 1% CVSS 7.6
HIGH This Month

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Code Injection Denial Of Service +1
NVD GitHub
CVE-2025-24977
EPSS 1% CVSS 9.1
CRITICAL Act Now

OpenCTI is an open cyber threat intelligence (CTI) platform. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

RCE Code Injection Opencti
NVD GitHub
CVE-2025-24887
EPSS 0% CVSS 6.3
MEDIUM This Month

OpenCTI is an open-source cyber threat intelligence platform. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass Opencti
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy