Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 19 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Citeum
Citeum opencti |
|
| CPEs | cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Citeum
Citeum opencti |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opencti-platform
Opencti-platform opencti |
|
| Vendors & Products |
Opencti-platform
Opencti-platform opencti |
Thu, 12 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to 6.8.16, the OpenCTI platform’s data ingestion feature accepts user-supplied URLs without validation and uses the Axios HTTP client with its default configuration (allowAbsoluteUrls: true). This allows attackers to craft requests to arbitrary endpoints, including internal services, because Axios will accept and process absolute URLs. This results in a semi-blind SSRF, as responses may not be fully visible but can still impact internal systems. This vulnerability is fixed in 6.8.16. | |
| Title | OpenCTI has a Semi-Blind SSRF via Unvalidated External URL in Data Ingestion Feature | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T17:52:55.089Z
Reserved: 2026-01-05T17:24:36.929Z
Link: CVE-2026-21887
Updated: 2026-03-12T17:52:50.218Z
Status : Analyzed
Published: 2026-03-12T17:16:36.813
Modified: 2026-03-19T17:39:31.873
Link: CVE-2026-21887
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:48:52Z