CodeChecker Authentication Bypass Vulnerability
An authentication bypass vulnerability exists in CodeChecker for certain API calls, allowing unauthenticated users to execute function calls with arbitrary arguments, potentially granting superuser permissions to an attacker.
An authentication bypass vulnerability has been discovered in CodeChecker versions 6.27.3 and earlier. The vulnerability exists due to improper authentication checks when accessing specific API endpoints under the /Authentication path. This allows unauthenticated users to execute functions such as getAuthorisedNames, getPermissionsForUser, hasPermission, addPermission, and removePermission with arbitrary arguments. Successful exploitation of this vulnerability can allow an attacker with a CodeChecker user to acquire superuser permissions, leading to complete control over the CodeChecker instance. The issue was reported on May 5, 2026, and a patch is available in version 6.27.4.
Attack Chain
- An unauthenticated attacker identifies a vulnerable CodeChecker instance running a version prior to 6.27.4.
- The attacker crafts a POST request to a vulnerable endpoint, such as
/v6.27/Authentication@addPermission, without providing valid authentication credentials. - The attacker includes parameters in the POST request to assign elevated privileges to an existing user account within CodeChecker.
- The CodeChecker server, due to the authentication bypass, processes the request without proper authentication checks.
- The
addPermissionfunction is executed, granting the specified user account the requested permissions, potentially including superuser privileges. - The attacker logs in to CodeChecker with the compromised user account.
- The attacker leverages the newly acquired superuser permissions to perform administrative tasks, such as modifying code analysis rules or accessing sensitive data.
- The attacker gains full control over the CodeChecker instance, potentially compromising the security of code analysis and development workflows.
Impact
Successful exploitation of this vulnerability allows an attacker to gain complete control over a CodeChecker instance. An attacker with a CodeChecker user can effectively acquire superuser permissions. This could lead to unauthorized access to sensitive code analysis data, modification of code analysis rules, or the introduction of malicious code into the development pipeline. The number of victims is currently unknown, but any organization using CodeChecker versions 6.27.3 or earlier is potentially affected.
Recommendation
- Upgrade CodeChecker to version 6.27.4 or later to patch CVE-2026-25660.
- Deploy the Sigma rule
Detect CodeChecker Authentication Bypass Attemptto your SIEM to detect exploitation attempts by monitoring for unauthorized access attempts to the Authentication API. - Monitor web server logs for POST requests to
/Authenticationendpoints from unauthenticated users, as highlighted in the example log entries in the overview.
Detection coverage 2
Detect CodeChecker Authentication Bypass Attempt
criticalDetects unauthorized POST requests to CodeChecker Authentication API endpoints, indicating a potential authentication bypass attempt.
Detect CodeChecker addPermission API Abuse
highDetects successful calls to the addPermission API from unexpected source IPs.
Detection queries are kept inside the platform. Get full rules →