Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2024-10081Authentication Bypass Using an Alternate Path or Channel in Codechecker

Severity
10.0CRITICALNVD
EPSS
73.9%
top 1.17%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 6

Description

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Authentication bypass occurs when the API URL ends with Authentication. This bypass allows superuser access to all API endpoints other than Authentication. These endpoints include the ability to add, edit, and remove products, among others. All endpoints, apart from the /Authentication is affected by the vulnerability. This issue affects CodeChecker: through 6.24.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0

Affected Packages4 packages

🔴Vulnerability Details

6
CVEList
CVE-2024-10081: CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy2024-11-06
OSV
CVE-2024-10081: CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy2024-11-06
GHSA
codechecker vulnerable to authentication bypass when using specifically crafted URLs2024-11-06
OSV
codechecker vulnerable to authentication bypass when using specifically crafted URLs2024-11-06
GHSA
follow-redirects' Proxy-Authorization header kept across hosts2024-03-14

💥Exploits & PoCs

1
Nuclei
CodeChecker <= 6.24.1 - Authentication Bypass

🕵️Threat Intelligence

1
Greynoiseio
NoiseLetter February 2026
CVE-2024-10081 — Ericsson Codechecker vulnerability | cvebase