CVE-2026-27960
Received Received - Intake
Privilege Escalation in OpenCTI Platform

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: GitHub, Inc.

Description
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. In versions 6.6.0 through 6.9.12, there is a privilege escalation vulnerability that can be exploited by unauthenticated attackers to query the API as any existing user, including the default admin account. This issue has been fixed in version 6.9.13. As a workaround, the default admin can be disabled using the `APP__ADMIN__EXTERNALLY_MANAGED` configuration.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
opencti opencti From 6.6.0 (inc) to 6.9.12 (inc)
opencti opencti 6.9.13
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-27960 is a critical privilege escalation vulnerability in the OpenCTI platform versions 6.6.0 through 6.9.12.

It allows unauthenticated attackers to query the API as any existing user, including the default admin account, effectively granting them full administrative access.

This means an attacker does not need any prior privileges or user interaction and can exploit this remotely over the network.

The vulnerability has been fixed in version 6.9.13.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized access to sensitive data and full administrative control over the OpenCTI platform.

  • Confidentiality impact: Attackers can access sensitive threat intelligence data.
  • Integrity impact: Attackers can modify or delete data within the platform.
  • Availability impact: Attackers can disrupt the availability of the platform.

Because the attack requires no privileges or user interaction and can be performed remotely, it poses a critical risk to any affected system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade OpenCTI to version 6.9.13 or later where the issue is fixed.

As an additional measure, disable the default admin account by setting the configuration APP__ADMIN__EXTERNALLY_MANAGED.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated attackers to gain full administrative access to the OpenCTI platform, potentially compromising the confidentiality, integrity, and availability of sensitive data.

Such unauthorized access and privilege escalation could lead to violations of common standards and regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive information.

Failure to remediate this vulnerability could result in non-compliance due to unauthorized data exposure or manipulation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart