CVE-2026-27960
OpenCTI · OpenCTI Platform
OpenCTI contains a privilege escalation vulnerability allowing unauthenticated attackers to query the API as any user, including the default administrator.
Executive summary
This critical privilege escalation vulnerability in OpenCTI enables unauthenticated attackers to gain administrative control over the platform, posing a severe risk to threat intelligence data.
Vulnerability
This is a privilege escalation vulnerability within the OpenCTI API authentication logic. It allows an unauthenticated remote attacker to bypass authorization checks and perform actions as any user, including the primary administrator.
Business impact
The ability for an unauthenticated actor to assume administrative privileges allows for full data exfiltration, deletion of threat intelligence, and potential persistent backdooring of the platform. With a CVSS score of 9.8, the impact is considered critical as it compromises the integrity and confidentiality of sensitive cybersecurity intelligence workflows.
Remediation
Immediate Action: Upgrade the OpenCTI platform to version 6.9.13 or later immediately to resolve the authentication bypass.
Proactive Monitoring: Audit API access logs for anomalous requests, particularly those originating from unknown IPs attempting to access administrative endpoints.
Compensating Controls: If patching is delayed, disable the default admin account using the APP__ADMIN__EXTERNALLY_MANAGED configuration setting to limit the attack surface.
Exploitation status
Public Exploit Available: No
Analyst recommendation
This vulnerability represents a significant risk to the security of your threat intelligence operations. Organizations should prioritize the deployment of the vendor-provided patch immediately to prevent unauthorized administrative access and potential platform compromise.