CVE-2026-27960
Privilege Escalation in OpenCTI Platform
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opencti | opencti | From 6.6.0 (inc) to 6.9.12 (inc) |
| opencti | opencti | 6.9.13 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-27960 is a critical privilege escalation vulnerability in the OpenCTI platform versions 6.6.0 through 6.9.12.
It allows unauthenticated attackers to query the API as any existing user, including the default admin account, effectively granting them full administrative access.
This means an attacker does not need any prior privileges or user interaction and can exploit this remotely over the network.
The vulnerability has been fixed in version 6.9.13.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized access to sensitive data and full administrative control over the OpenCTI platform.
- Confidentiality impact: Attackers can access sensitive threat intelligence data.
- Integrity impact: Attackers can modify or delete data within the platform.
- Availability impact: Attackers can disrupt the availability of the platform.
Because the attack requires no privileges or user interaction and can be performed remotely, it poses a critical risk to any affected system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade OpenCTI to version 6.9.13 or later where the issue is fixed.
As an additional measure, disable the default admin account by setting the configuration APP__ADMIN__EXTERNALLY_MANAGED.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthenticated attackers to gain full administrative access to the OpenCTI platform, potentially compromising the confidentiality, integrity, and availability of sensitive data.
Such unauthorized access and privilege escalation could lead to violations of common standards and regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive information.
Failure to remediate this vulnerability could result in non-compliance due to unauthorized data exposure or manipulation.