OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to 6.9.5, the safeEjs.ts file does not properly sanitize EJS templates. Users with the Manage customization capability can run arbitrary JavaScript in the context of the OpenCTI platform process during notifier template execution. This vulnerability is fixed in 6.9.5.
References
| Link | Resource |
|---|---|
| https://github.com/OpenCTI-Platform/opencti/releases/tag/6.9.5 | Product Release Notes |
| https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jv9r-jw2f-rhrf | Vendor Advisory |
Configurations
History
22 Apr 2026, 00:27
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:* | |
| First Time |
Citeum
Citeum opencti |
|
| References | () https://github.com/OpenCTI-Platform/opencti/releases/tag/6.9.5 - Product, Release Notes | |
| References | () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jv9r-jw2f-rhrf - Vendor Advisory |
09 Apr 2026, 18:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 18:17
Updated : 2026-04-22 00:27
NVD link : CVE-2026-39980
Mitre link : CVE-2026-39980
CVE.ORG link : CVE-2026-39980
JSON object : View
Products Affected
citeum
- opencti
CWE
CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
