PyPi: Codechecker

CVE-2024-10082

Safety vulnerability ID: 78816

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 06, 2024 Updated at Sep 20, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of the codechecker package are vulnerable to Authentication Method Confusion due to improper validation of authentication sources for the built-in root user account. The vulnerability exists in versions through 6.24.1, where an auto-generated superuser account with a weakly generated username is stored in the root.user file cannot be disabled and is unconditionally granted superuser permissions regardless of the authentication service used. An attacker who can create an account on any enabled external authentication service (such as LDAP or PAM) can exploit this vulnerability by registering with the same username as the built-in root user, thereby gaining full administrative access to the CodeChecker instance and control over all functionality accessible via the web interface.

Affected package

codechecker

Latest version: 6.26.0

CodeChecker is an analyzer tooling, defect database and viewer extension

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.1

CVSS v3 Details

CRITICAL 9.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE