{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T14:56:22.876","vulnerabilities":[{"cve":{"id":"CVE-2026-21886","sourceIdentifier":"security-advisories@github.com","published":"2026-03-17T16:16:19.953","lastModified":"2026-03-19T19:33:27.520","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.9.1, the GraphQL mutations \"IndividualDeletionDeleteMutation\" is intended to allow users to delete individual entity objects respectively. However, it was observed that this mutation can be misused to delete unrelated and sensitive objects such as analyses reports etc. This behavior stems from the lack of validation in the API to ensure that the targeted object is contextually related to the mutation being executed. Version 6.9.1 fixes the issue."},{"lang":"es","value":"OpenCTI es una plataforma de código abierto para gestionar conocimiento de inteligencia de amenazas cibernéticas y observables. Antes de la versión 6.9.1, la mutación de GraphQL 'IndividualDeletionDeleteMutation' está destinada a permitir a los usuarios eliminar objetos de entidad individuales respectivamente. Sin embargo, se observó que esta mutación puede ser mal utilizada para eliminar objetos no relacionados y sensibles, como informes de análisis, etc. Este comportamiento se deriva de la falta de validación en la API para asegurar que el objeto objetivo esté contextualmente relacionado con la mutación que se está ejecutando. La versión 6.9.1 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-285"},{"lang":"en","value":"CWE-566"},{"lang":"en","value":"CWE-915"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*","versionEndExcluding":"6.9.1","matchCriteriaId":"770FF6DC-74FC-4739-8A2E-A554D43CF7A9"}]}]}],"references":[{"url":"https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-mhmx-j75v-2m6x","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}