CVE-2025-61781

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to delete other users' workspaces in OpenCTI by exploiting an authorization flaw in the GraphQL mutation 'WorkspacePopoverDeletionMutation'. Any OpenCTI instance running versions before 6.8.1 is affected, potentially allowing unauthorized data destruction.

💻 Affected Systems

Products:
  • OpenCTI
Versions: All versions prior to 6.8.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All OpenCTI deployments with the vulnerable mutation enabled are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of critical threat intelligence data including dashboards and investigation cases, disrupting security operations and potentially causing data recovery challenges.

🟠

Likely Case

Unauthorized deletion of workspaces belonging to other users, leading to data loss and operational disruption within the threat intelligence platform.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring, though the vulnerability still exists until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal technical skill - just knowledge of another user's workspace UUID.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.8.1

Vendor Advisory: https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-pr6m-q4g7-342c

Restart Required: Yes

Instructions:

1. Backup your OpenCTI data and configuration. 2. Update OpenCTI to version 6.8.1 or later using your deployment method (Docker, manual install, etc.). 3. Restart the OpenCTI service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable vulnerable mutation

all

Temporarily disable or restrict access to the 'WorkspacePopoverDeletionMutation' GraphQL mutation

# Requires modifying GraphQL schema or implementing middleware to block the mutation

Implement API gateway filtering

all

Add WAF or API gateway rules to block mutation requests containing UUID patterns

# Configure your WAF/API gateway to filter GraphQL requests with mutation: WorkspacePopoverDeletionMutation

🧯 If You Can't Patch

  • Implement strict access controls and monitor all GraphQL mutation requests
  • Enable comprehensive logging and alerting for workspace deletion activities

🔍 How to Verify

Check if Vulnerable:

Check OpenCTI version via web interface or API. If version is below 6.8.1, the system is vulnerable.

Check Version:

curl -X POST http://your-opencti-url/api/graphql -H 'Content-Type: application/json' -d '{"query":"{ version }"}'

Verify Fix Applied:

After updating, verify version is 6.8.1 or higher and test that workspace deletion now requires proper authorization.

📡 Detection & Monitoring

Log Indicators:

  • GraphQL logs showing 'WorkspacePopoverDeletionMutation' requests
  • Workspace deletion events from users not owning the workspace
  • Multiple workspace deletions in short timeframes

Network Indicators:

  • GraphQL POST requests to /api/graphql with mutation: WorkspacePopoverDeletionMutation
  • Unusual patterns of workspace deletion API calls

SIEM Query:

source="opencti" AND ("WorkspacePopoverDeletionMutation" OR "workspace deletion") | stats count by user, workspace_id

🔗 References

📤 Share & Export