General

This section describes the common structure of all webhook messages our platform sends. Every webhook message is delivered as a POST request to a customer-defined URL and follows a consistent format. The actual content inside the data field varies depending on the type of document (e.g., security_advisory, threat_intelligence), but the envelope is always the same.

🚀 Delivery Template Overview

The webhook system uses a templated HTTP POST request without authentication. This is the default structure used for all webhook messages:

POST https://webhooks.customer-name.io/updates
Content-Type: application/json
Accept: */*

🔄 Body (Dynamic JSON)

{
"data": { ... },
"trigger_type": "resultitem:new",
"cybernality_details_url": "https://www.cybernality.ai/resultitem/view?ri_id=30527"
}

If a wrapper key is configured (e.g., event_wrapper), the body will be wrapped accordingly:

{
"event_wrapper": {
"data": { ... },
"trigger_type": "resultitem:updated",
"cybernality_details_url": "https://www.cybernality.ai/resultitem/view?ri_id=30527"
}
}

Note:

  • The wrapper key allows wrapping the payload inside a named outer object. If not provided, the body is a flat object with data , trigger_type and cybernality_details_urldirectly at the root.

📦 Supported Payload Types

The data object will always contain one of the following payload types:

Detailed schemas for each document_type are available in their respective documentation sections.

🔁 Trigger Types

The webhook can be triggered by the following event types:

📁 Top-Level Fields

Field

Type

Description

data

object

The actual payload, structured according to its document_type.

trigger_type

string

Specifies which kind of event (creation or update) caused this webhook message to be sent.

cybernality_details_url

string

The url that directly leads to the details page on cybernality.

✅ Developer Notes

⚠️ Note: Payloads may grow over time as we introduce new fields. We recommend designing your webhook consumer to tolerate unknown fields.

📃 Example Payload: security_advisory

{
"data": {
"CVEs": [
"CVE-2025-31651",
"CVE-2025-31650"
],
"classification": "Security Advisory",
"cvss": [
{
"cve_id": "CVE-2025-31651",
"cvss_risk_assessment": "**Expert Security Assessment:**\nThese vulnerabilities pose significant risks, with the access restriction bypass being particularly critical. Successful exploitation could lead to full control over affected systems and severe service disruptions.\n\n**Risk Evaluation:**\n\nFor CVE-2025-31650 (DoS):\n- **AV:N**: Remotely exploitable, increasing the scope of potential attacks.\n- **AC:L**: Low complexity, making it easier for attackers to exploit.\n- **PR:N**: No privileges are required, allowing unauthenticated attackers to initiate the attack.\n- **UI:N**: No user interaction is needed, enabling automated exploitation.\n- **S:U**: Affects the availability of the system, leading to potential service outages.\n\nFor CVE-2025-31651 (Access Restriction Bypass):\n- **AV:N**: Remotely exploitable, broadening the attack surface.\n- **AC:L**: Low complexity, making exploitation more feasible.\n- **PR:N**: No privileges required, allowing any attacker to attempt exploitation.\n- **UI:N**: No user interaction needed, facilitating automated attacks.\n- **S:U**: Compromises confidentiality, integrity, and availability, leading to severe impacts.\n- **C:H/I:H/A:H**: High impact on confidentiality, integrity, and availability, indicating critical risks to data security and system functionality.\n\n**Real-World Impact:**\nOrganizations using the affected HPE Telco Service Orchestrator software may experience significant service disruptions due to DoS attacks and unauthorized access to sensitive information, leading to potential data breaches and loss of service availability.",
"cvss_score": {
"label": "critical",
"value": 9.8
},
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cvss_version": "3.1",
"parsed_cvss_vector": {
"Attack Complexity": "Low",
"Attack Vector": "Network",
"Availability": "High",
"Confidentiality": "High",
"Integrity": "High",
"Privileges Required": "None",
"Scope": "Unchanged",
"User Interaction": "None"
}
},
{
"cve_id": "CVE-2025-31650",
"cvss_risk_assessment": "**Expert Security Assessment:**\nThis vulnerability is highly critical, allowing remote attackers to bypass access restrictions and initiate Denial of Service (DoS) attacks on HPE Telco Service Orchestrator software. The high CVSS scores indicate severe potential impacts, with the access restriction bypass being particularly concerning.\n\n**Risk Evaluation:**\n- **AV:N**: Remotely exploitable, significantly increasing the scope of potential attacks.\n- **AC:L**: Low complexity required for exploitation, making it accessible to a wide range of attackers.\n- **PR:N**: No privileges are required, allowing unauthenticated attackers to exploit the vulnerability.\n- **UI:N**: No user interaction is needed, enabling automated and stealthy attacks.\n- **S:U**: The impact does not change based on the scope, affecting the targeted system directly.\n- **C:N**: No confidentiality impact, as the primary concern is availability and access control.\n- **I:N**: No integrity impact, focusing on service disruption and unauthorized access.\n- **A:H**: High availability impact, leading to potential DoS conditions.\n\n**Real-World Impact:**\nOrganizations using affected versions of HPE Telco Service Orchestrator may experience significant service disruptions due to DoS attacks and unauthorized access to restricted areas, leading to operational downtime and potential data exposure.",
"cvss_score": {
"label": "high",
"value": 7.5
},
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cvss_version": "3.1",
"parsed_cvss_vector": {
"Attack Complexity": "Low",
"Attack Vector": "Network",
"Availability": "High",
"Confidentiality": "None",
"Integrity": "None",
"Privileges Required": "None",
"Scope": "Unchanged",
"User Interaction": "None"
}
}
],
"last_updated_date": "2025-06-03T00:00:00+00:00",
"product_features": [
{
"criterias": {
"criterion": [],
"operator": ""
},
"meta_data": [],
"product": "HPE Telco Service Orchestrator",
"resolution": {
"other_fix": [],
"product_fix": [
">=5.3.2"
]
},
"vendor": "Hewlett Packard Enterprise",
"version": [
"<5.3.2"
]
}
],
"product_vendor": "Aruba",
"published_date": "2025-06-03T00:00:00+00:00",
"publishing_company": "Hewlett Packard Enterprise Development LP",
"references": [
"https://myenterpriselicense.hpe.com/",
"https://www.hpe.com/info/report-security-vulnerability",
"https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00100637en_us",
"http://www.hpe.com/support/Subscriber_Choice",
"http://www.hpe.com/support/Security_Bulletin_Archive"
],
"scraped_date": "2025-06-03T19:07:12+00:00",
"severities": [
{
"origin_name": "HPE",
"severity": "high"
},
{
"origin_name": "HPE",
"severity": "critical"
}
],
"solution": "Update to HPE Telco Service Orchestrator v5.3.2 or later. Download from https://myenterpriselicense.hpe.com/.",
"summary": "Two remotely exploitable vulnerabilities in HPE Telco Service Orchestrator software could allow Denial of Service (DoS) and Access Restriction Bypass. CVE-2025-31650 is a DoS vulnerability (CVSS 7.5, high), and CVE-2025-31651 is an access restriction bypass (CVSS 9.8, critical).",
"title": "HPESBNW04872 rev.1 - HPE Telco Service Orchestrator software, Multiple Vulnerabilities",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04872en_us&docLocale=en_US",
"vendor_severity": "",
"version_info": "Version:1 (rev.1) - 3 June 2025 Initial release",
"vulnerable_products": [
"HPE Telco Service Orchestrator - Prior to v5.3.2
]
},
"trigger_type": "resultitem:new",
"cybernality_details_url": "https://www.cybernality.ai/resultitem/view?ri_id=30527"
}

This example shows how a security_advisory message would appear when delivered to a webhook. The contents of data follow the defined structure for this payload type.

🛠️ Customizing Delivery

You can configure certain aspects of the webhook message format:

Option

Description

event_wrapper

Wraps the entire payload inside a named outer key (e.g., "event_wrapper").

target_url

Specifies where the webhook is delivered.

Published with Nuclino