PROBABLYPWNED
VulnerabilitiesMay 6, 20263 min read

OpenCTI Auth Bypass Lets Attackers Hijack Admin Accounts (CVSS 9.8)

CVE-2026-27960 in OpenCTI 6.6.0-6.9.12 allows unauthenticated API access as any user, including admin. Upgrade to 6.9.13 or disable the default admin account.

Marcus Chen

A critical authentication bypass vulnerability in OpenCTI, the popular open-source cyber threat intelligence platform, allows unauthenticated attackers to query the API as any existing user—including the default administrator account. CVE-2026-27960 carries a CVSS score of 9.8 and requires only network access to exploit.

The flaw affects OpenCTI versions 6.6.0 through 6.9.12. Organizations running vulnerable instances should upgrade to 6.9.13 immediately.

The Irony of a Compromised CTI Platform

OpenCTI is designed to aggregate, store, and correlate threat intelligence—malware samples, indicators of compromise, threat actor profiles, and attack patterns. Security teams use it to understand adversaries and defend their organizations.

A compromised CTI platform is particularly dangerous. Attackers gaining admin access could:

  • Exfiltrate intelligence on what threats an organization knows about (and doesn't)
  • Identify gaps in detection capabilities
  • Inject false intelligence to mislead defenders
  • Access integrated feeds and API keys for connected security tools
  • Use the platform as a pivot point into security operations infrastructure

When the tool meant to track threats becomes the threat vector, the implications extend far beyond typical application compromise.

Technical Details

CVE-2026-27960 stems from improper authentication handling (CWE-287) in OpenCTI's API layer. Unauthenticated attackers can craft requests that the API processes as if they originated from legitimate users, including accounts with administrative privileges.

The attack requires no credentials, no social engineering, no prior access—just network connectivity to the OpenCTI instance. For organizations exposing OpenCTI to the internet or broader internal networks, the exposure is immediate upon exploitation.

This vulnerability follows a pattern we've tracked across security tooling and infrastructure. When defenders adopt complex platforms without proper hardening, the tools themselves become high-value targets.

Affected Versions and Remediation

Vulnerable: OpenCTI 6.6.0 through 6.9.12

Fixed: OpenCTI 6.9.13

Immediate workaround: Disable the default admin account by setting APP__ADMIN__EXTERNALLY_MANAGED in your configuration. This doesn't patch the underlying flaw but removes the most dangerous privilege escalation path.

Organizations should also:

  1. Audit OpenCTI access logs for unusual API activity
  2. Rotate any API keys or credentials stored in the platform
  3. Review integrations with other security tools for signs of abuse
  4. Restrict network access to OpenCTI instances while upgrading

Context: Security Tools Under Fire

Security platforms have become attractive targets because they aggregate sensitive information and often have elevated access to other systems. We've seen similar issues across the security tooling landscape—from authentication vulnerabilities in access management platforms to supply chain attacks targeting developer security tools.

The trend makes sense from an attacker's perspective. Why enumerate targets manually when you can compromise the platform that already has them catalogued? Why bypass security controls when you can compromise the tool enforcing them?

Why This Matters

CTI platforms sit at the intersection of threat awareness and incident response. They contain the organization's institutional knowledge about adversaries, often correlate with real-time detection systems, and typically have API access to a range of security infrastructure.

Losing control of that platform—especially to a completely unauthenticated attacker—represents a significant intelligence failure. The attacker gains visibility into defensive capabilities while potentially undermining the integrity of future threat analysis.

Organizations treating their OpenCTI instances as "internal only" shouldn't feel comfortable. Internal network access combined with this vulnerability equals admin access. Patch now.

Related Articles