CVE-2025-24977

OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` can execute commands on the underlying infrastructure where OpenCTI is hosted and can access internal server side secrets by misusing the web-hooks. Since the malicious user gets a root shell inside a container this opens up the the infrastructure environment for further attacks and exposures. Version 6.4.11 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*

History

22 May 2025, 15:52

Type Values Removed Values Added
First Time Citeum
Citeum opencti
CPE cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*
Summary
  • (es) OpenCTI es una plataforma abierta de inteligencia de ciberamenazas (CTI). Antes de la versión 6.4.11, cualquier usuario con la capacidad de "gestionar personalizaciones" podía ejecutar comandos en la infraestructura subyacente donde se alojaba OpenCTI y acceder a secretos internos del servidor mediante el uso indebido de webhooks. Dado que el usuario malicioso obtiene un shell root dentro de un contenedor, esto expone la infraestructura a nuevos ataques y exposiciones. La versión 6.4.11 soluciona este problema.
References () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm - () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm - Vendor Advisory

05 May 2025, 17:18

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-05 17:18

Updated : 2025-05-22 15:52


NVD link : CVE-2025-24977

Mitre link : CVE-2025-24977

CVE.ORG link : CVE-2025-24977


JSON object : View

Products Affected

citeum

  • opencti
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')