{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25660","assignerOrgId":"85b1779b-6ecd-4f52-bcc5-73eac4659dcf","state":"PUBLISHED","assignerShortName":"ERIC","dateReserved":"2026-02-04T12:41:54.869Z","datePublished":"2026-04-24T13:10:26.171Z","dateUpdated":"2026-04-24T13:51:11.174Z"},"containers":{"cna":{"providerMetadata":{"orgId":"85b1779b-6ecd-4f52-bcc5-73eac4659dcf","shortName":"ERIC","dateUpdated":"2026-04-24T13:10:26.171Z"},"title":"Authentication bypass for certain API calls","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-290","description":"CWE-290 Authentication bypass by spoofing","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-863","description":"CWE-863 Incorrect Authorization","type":"CWE"}]}],"affected":[{"vendor":"Ericsson","product":"CodeChecker","versions":[{"status":"affected","version":"0","lessThanOrEqual":"6.27.3","changes":[{"at":"6.27.4","status":"unaffected"}],"versionType":"python"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \nAuthentication bypass occurs when the URL ends with Authentication with certain function calls.  This bypass allows assigning arbitrary permission to any user existing in CodeChecker.\n\nThis issue affects CodeChecker: through 6.27.3.","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. </span><br><p>Authentication bypass occurs when the URL ends with Authentication with certain function calls.&nbsp; This bypass allows assigning arbitrary permission to any user existing in CodeChecker.</p><p>This issue affects CodeChecker: through 6.27.3.</p><p></p>"}]}],"tags":["x_open-source"],"references":[{"url":"https://github.com/Ericsson/codechecker/security/advisories/GHSA-4v9x-cqc5-j645","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"PROOF_OF_CONCEPT","Safety":"NEGLIGIBLE","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","version":"4.0","baseSeverity":"CRITICAL","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/S:N/AU:Y/R:U/V:C/RE:M/U:Red"}}],"credits":[{"lang":"en","value":"Scott Tolley","type":"finder"}],"source":{"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-24T13:50:59.651031Z","id":"CVE-2026-25660","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-24T13:51:11.174Z"}}]}}