CVE-2025-24977

9.1 CRITICAL

📋 TL;DR

OpenCTI versions before 6.4.11 contain a critical vulnerability where users with 'manage customizations' capability can execute arbitrary commands on the underlying infrastructure via webhook misuse. This allows attackers to obtain root shell access within containers and access internal server secrets. All OpenCTI deployments with users having this capability are affected.

💻 Affected Systems

Products:
  • OpenCTI
Versions: All versions prior to 6.4.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user with 'manage customizations' capability. Default installations may have administrative users with this capability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the OpenCTI infrastructure, lateral movement to connected systems, exfiltration of sensitive threat intelligence data, and persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to data theft, privilege escalation, and container escape to host system.

🟢

If Mitigated

Limited impact if proper access controls restrict 'manage customizations' capability to trusted administrators only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user with 'manage customizations' capability. The advisory provides technical details that could facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.11

Vendor Advisory: https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mf88-g2wq-p7qm

Restart Required: Yes

Instructions:

1. Backup your OpenCTI data and configuration. 2. Update to version 6.4.11 using your deployment method (Docker, Kubernetes, manual). 3. Restart all OpenCTI services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict 'manage customizations' capability

all

Temporarily remove 'manage customizations' capability from all non-essential users until patching can be completed.

UPDATE users SET capabilities = array_remove(capabilities, 'manage customizations') WHERE username != 'admin';

🧯 If You Can't Patch

  • Immediately audit and restrict 'manage customizations' capability to absolute minimum required users
  • Implement network segmentation to isolate OpenCTI from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check OpenCTI version via web interface or API. If version is below 6.4.11, the system is vulnerable.

Check Version:

docker exec opencti_platform curl -s http://localhost:8080/api/version | grep version

Verify Fix Applied:

Confirm version is 6.4.11 or higher and test that webhook functionality no longer allows command injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual webhook creation/modification
  • Suspicious command execution in container logs
  • Unexpected process spawning

Network Indicators:

  • Outbound connections from OpenCTI container to unexpected destinations
  • Command and control traffic patterns

SIEM Query:

source="opencti" AND (event="webhook_created" OR event="webhook_modified") AND user!="admin"

🔗 References

📤 Share & Export