{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T08:59:28.583","vulnerabilities":[{"cve":{"id":"CVE-2025-1300","sourceIdentifier":"85b1779b-6ecd-4f52-bcc5-73eac4659dcf","published":"2025-02-28T13:15:27.043","lastModified":"2025-11-14T15:29:28.110","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \n\nThe CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway.\n\nThis issue affects CodeChecker: through 6.24.5."},{"lang":"es","value":"CodeChecker es una herramienta de análisis, una base de datos de defectos y una extensión de visualización para Clang Static Analyzer y Clang Tidy. El servidor web CodeChecker contiene una vulnerabilidad de redireccionamiento abierto debido a la falta de protecciones contra múltiples barras después del nombre del producto en la URL. Esto hace que se evadan las protecciones contra CVE-2021-28861, lo que conduce a la misma vía de redireccionamiento abierto. Este problema afecta a CodeChecker: hasta la versión 6.24.5."}],"metrics":{"cvssMetricV31":[{"source":"85b1779b-6ecd-4f52-bcc5-73eac4659dcf","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"85b1779b-6ecd-4f52-bcc5-73eac4659dcf","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ericsson:codechecker:*:*:*:*:*:*:*:*","versionEndExcluding":"6.24.6","matchCriteriaId":"09E09A9A-AB91-4AB2-B40F-2FE5D5125636"}]}]}],"references":[{"url":"https://github.com/Ericsson/codechecker/security/advisories/GHSA-g839-x3p3-g5fm","source":"85b1779b-6ecd-4f52-bcc5-73eac4659dcf","tags":["Vendor Advisory"]}]}}]}