Cyber Posture

CVE-2024-53829

HighPublic PoC

Published: 21 January 2025

Published
21 January 2025
Modified
14 November 2025
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
EPSS Score 0.0018 39.0th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53829 is a high-severity CSRF (CWE-352) vulnerability in Ericsson Codechecker. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-23 requires mechanisms to protect communications session authenticity, such as CSRF tokens or SameSite cookies, directly preventing unauthenticated attackers from hijacking logged-in user sessions in CodeChecker.

prevent

SI-10 mandates validation of information inputs to the web API, rejecting forged requests lacking valid CSRF tokens and blocking unauthorized product modifications.

prevent

SI-2 requires timely flaw remediation, such as patching CodeChecker to versions beyond 6.24.4, eliminating the specific CSRF vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
Why these techniques?

CSRF flaw in public-facing web API directly enables exploitation of the application (T1190) via user interaction with a malicious link/resource (T1204.001) to abuse authenticated sessions.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Cross-site request forgery allows an unauthenticated attacker to hijack the authentication of a logged in user, and use the web API with…

more

the same permissions, including but not limited to adding, removing or editing products. The attacker needs to know the ID of the available products to modify or delete them. The attacker cannot directly exfiltrate data (view) from CodeChecker, due to being limited to form-based CSRF. This issue affects CodeChecker: through 6.24.4.

Deeper analysisAI

CVE-2024-53829 is a cross-site request forgery (CSRF) vulnerability, classified under CWE-352, in CodeChecker, an analyzer tooling, defect database, and viewer extension for the Clang Static Analyzer and Clang Tidy. The flaw allows an unauthenticated attacker to hijack the authentication of a logged-in user and perform actions via the web API with the victim's permissions. It affects CodeChecker versions through 6.24.4 and carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N).

An unauthenticated attacker can exploit this vulnerability by tricking a logged-in user into interacting with a malicious webpage or resource that submits forged requests to the CodeChecker web API. Successful exploitation grants the attacker the same permissions as the victim, enabling actions such as adding, removing, or editing products. However, the attacker must know the IDs of existing products to modify or delete them and cannot directly exfiltrate data (e.g., view reports) due to the form-based nature of the CSRF limitation.

The GitHub security advisory at https://github.com/Ericsson/codechecker/security/advisories/GHSA-f8c8-4pm7-w885 provides details on the issue, including mitigation guidance. Affected users should upgrade to CodeChecker versions beyond 6.24.4, where the vulnerability is addressed.

Details

CWE(s)

Affected Products

ericsson
codechecker
≤ 6.24.5

CVEs Like This One

CVE-2026-25660Same product: Ericsson Codechecker
CVE-2025-26550Shared CWE-352
CVE-2025-23661Shared CWE-352
CVE-2026-39640Shared CWE-352
CVE-2025-25147Shared CWE-352
CVE-2025-25100Shared CWE-352
CVE-2025-23872Shared CWE-352
CVE-2025-24756Shared CWE-352
CVE-2025-55045Shared CWE-352
CVE-2024-56903Shared CWE-352

References