PYSEC-2025-12

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/codechecker/PYSEC-2025-12.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2025-12
Aliases
Published
2025-01-21T15:15:13Z
Modified
2025-04-08T11:13:16.130271Z
Summary
[none]
Details

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Cross-site request forgery allows an unauthenticated attacker to hijack the authentication of a logged in user, and use the web API with the same permissions, including but not limited to adding, removing or editing products. The attacker needs to know the ID of the available products to modify or delete them. The attacker cannot directly exfiltrate data (view) from CodeChecker, due to being limited to form-based CSRF.

This issue affects CodeChecker: through 6.24.4.

References

Affected packages

PyPI / codechecker

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.25.0

Affected versions

6.*

6.16.0a1
6.16.0
6.17.0
6.18.0
6.18.1
6.18.2
6.19.0
6.19.1
6.20.0rc1
6.20.0
6.21.0rc1
6.21.0
6.22.0rc1
6.22.0
6.22.1
6.22.2
6.22.2.post1
6.23.0rc2
6.23.0
6.23.1
6.24.0
6.24.1
6.24.2
6.24.4