Skip to content

ByteWraith1/CVE-2026-27906

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

CVE-2026-27960

Overview

The OpenCTI platform suffers from a privilege escalation vulnerability that permits unauthenticated attackers to exploit the API and access it as any existing user, including the default administrator.

Published Date

5 May 2026

Key Points

  • Severity: Critical
  • CVSS Score: 9.8 (High)
  • Confidentiality: High
  • Integrity: High
  • Availability: High
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None

Requirements

  • Python 3.8+
  • Libraries: requests, argparse (install via pip install -r requirements.txt)

Usage

  • Install dependencies: pip install -r requirements.txt
  • Run the explоit: python explоit.py --target <target_url> --file "/path/to/Web.config"

How It Works

This vulnerability affects versions 6.6.0 through 6.9.12. Users are encouraged to upgrade to version 6.9.13, which contains the necessary fixes. Additionally, disabling the default admin account using the APP__ADMIN__EXTERNALLY_MANAGED configuration is recommended as a temporary workaround to enhance security.

Ethical Use Warning

  • This script is a proof-of-concept for CVE-2026-27960 for educational and authorized security testing purposes.
  • Do not use this script on systems without explicit permission from the system owner.
  • Misuse may violate laws, including the Computer Fraud and Abuse Act (CFAA) in the United States or similar laws elsewhere.
  • Always obtain written consent before testing any system.

PoC explоit download here

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors