OpenCTI CVE-2026-27960: Brief Summary of Critical Unauthenticated API Impersonation Vulnerability

A brief summary of CVE-2026-27960, a critical authentication bypass in OpenCTI (CVSS 9.8) that allows unauthenticated attackers to query the API as any existing user, including the default admin account. Covers affected versions, technical details, and available mitigations.

CVE Analysis

5 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-05-05

OpenCTI CVE-2026-27960: Brief Summary of Critical Unauthenticated API Impersonation Vulnerability
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

An authentication bypass in OpenCTI's API allows any unauthenticated remote attacker to impersonate existing users, including the default administrator, and execute arbitrary API queries with their full privileges. For organizations relying on OpenCTI to manage sensitive cyber threat intelligence, this vulnerability exposes the entire knowledge base, all observables, and platform configuration to unauthorized access and manipulation.

OpenCTI is an open source cyber threat intelligence platform developed by Filigran that enables security teams to structure, store, and operationalize threat intelligence data. It is widely adopted across government agencies, MSSPs, and enterprise SOCs as a central hub for CTI workflows, integrating with tools like MISP, TheHive, and various SIEM platforms. Its role as a repository for sensitive threat data and indicators of compromise makes any authentication bypass particularly consequential.

Technical Information

The root cause of CVE-2026-27960 is an Improper Authentication weakness (CWE-287) within the OpenCTI API. The flaw allows unauthenticated attackers to completely bypass the platform's authentication mechanisms and execute API queries in the context of any user that exists in the system. When the default admin account is active, which is the case in standard installations, an attacker can trivially escalate to full administrative control over the entire threat intelligence platform.

CVSS Breakdown

The CVSS v3.1 vector string is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, producing a 9.8 Critical score. Each metric contributes to the severity:

MetricValueImplication
Attack Vector (AV)NetworkExploitable remotely
Attack Complexity (AC)LowNo special conditions required
Privileges Required (PR)NoneUnauthenticated access
User Interaction (UI)NoneAutomated exploitation possible
Confidentiality (C)HighFull data exposure
Integrity (I)HighData manipulation possible
Availability (A)HighService disruption possible

Attack Flow

Based on the advisory details, exploitation follows this general sequence:

  1. An attacker identifies a network accessible OpenCTI instance running a vulnerable version (6.6.0 through 6.9.12).
  2. The attacker crafts unauthenticated API requests that exploit the authentication bypass to impersonate an existing user.
  3. By targeting the default admin account, the attacker gains full read and write access to all threat intelligence data, platform configuration, user management, and any integrated feeds or connectors.
  4. With administrative API access, the attacker can exfiltrate sensitive threat intelligence, modify or delete observables and indicators, create new accounts for persistence, or disrupt platform operations entirely.

The combination of no authentication requirement, low complexity, and no user interaction means this vulnerability is well suited for automated scanning and exploitation at scale.

Mitigation

The only complete resolution is to upgrade OpenCTI to version 6.9.13 or later.

As an interim measure, administrators can disable the default admin account by setting the APP__ADMIN__EXTERNALLY_MANAGED configuration option. The official advisory explicitly notes that this is a partial workaround only: the underlying authentication bypass remains, and other user accounts in the system can still be impersonated. Administrators should verify their configuration state after applying this workaround and treat the upgrade as the definitive fix.

Affected Systems and Versions

The vulnerability affects OpenCTI versions greater than or equal to 6.6.0 and less than 6.9.13. Specifically:

  • Vulnerable range: versions 6.6.0 through 6.9.12
  • Fixed version: 6.9.13

Any OpenCTI deployment within the vulnerable version range that exposes its API to the network is at risk. Instances with the default admin account enabled (the default configuration) are at the highest risk of full platform compromise.

References

Detect & fix
what others miss

Security magnifying glass visualization