Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14854 | OpenCTI is an open-source cyber threat intelligence platform. In versions starting from 6.4.8 to before 6.4.10, the allow/deny lists can be bypassed, allowing a user to change attributes that are intended to be unmodifiable by the user. It is possible to toggle the `external` flag on/off and change the own token value for a user. It is also possible to edit attributes that are not in the allow list, such as `otp_qr` and `otp_activated`. If external users exist in the OpenCTI setup and the information about these users identities is sensitive, the above vulnerabilities can be used to enumerate existing user accounts as a standard low privileged user. This issue has been patched in version 6.4.10. |
Mon, 19 May 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Citeum
Citeum opencti |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Citeum
Citeum opencti |
Wed, 30 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 30 Apr 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenCTI is an open-source cyber threat intelligence platform. In versions starting from 6.4.8 to before 6.4.10, the allow/deny lists can be bypassed, allowing a user to change attributes that are intended to be unmodifiable by the user. It is possible to toggle the `external` flag on/off and change the own token value for a user. It is also possible to edit attributes that are not in the allow list, such as `otp_qr` and `otp_activated`. If external users exist in the OpenCTI setup and the information about these users identities is sensitive, the above vulnerabilities can be used to enumerate existing user accounts as a standard low privileged user. This issue has been patched in version 6.4.10. | |
| Title | OpenCTI bypass of protected attribute update | |
| Weaknesses | CWE-284 CWE-657 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-30T19:06:07.538Z
Reserved: 2025-01-27T15:32:29.450Z
Link: CVE-2025-24887
Updated: 2025-04-30T19:05:58.509Z
Status : Analyzed
Published: 2025-04-30T19:15:55.070
Modified: 2025-05-19T11:51:33.870
Link: CVE-2025-24887
No data.
OpenCVE Enrichment
No data.
EUVD