diff --git a/java/ql/src/Security/CWE/CWE-020/OverlyLargeRange.ql b/java/ql/src/Security/CWE/CWE-020/OverlyLargeRange.ql index b8ea3e52dbd..5762785949e 100644 --- a/java/ql/src/Security/CWE/CWE-020/OverlyLargeRange.ql +++ b/java/ql/src/Security/CWE/CWE-020/OverlyLargeRange.ql @@ -4,7 +4,7 @@ * This may allow an attacker to bypass a filter or sanitizer. * @kind problem * @problem.severity warning - * @security-severity 5.0 + * @security-severity 4.0 * @precision high * @id java/overly-large-range * @tags correctness diff --git a/java/ql/src/Security/CWE/CWE-614/InsecureCookie.ql b/java/ql/src/Security/CWE/CWE-614/InsecureCookie.ql index b8d64d22e29..44107281feb 100644 --- a/java/ql/src/Security/CWE/CWE-614/InsecureCookie.ql +++ b/java/ql/src/Security/CWE/CWE-614/InsecureCookie.ql @@ -4,7 +4,7 @@ * interception. * @kind problem * @problem.severity error - * @security-severity 5.0 + * @security-severity 4.0 * @precision high * @id java/insecure-cookie * @tags security diff --git a/java/ql/src/change-notes/2025-10-22-adjust-query-severity.md b/java/ql/src/change-notes/2025-10-22-adjust-query-severity.md new file mode 100644 index 00000000000..61cc9402a78 --- /dev/null +++ b/java/ql/src/change-notes/2025-10-22-adjust-query-severity.md @@ -0,0 +1,5 @@ +--- +category: queryMetadata +--- +* Reduced the `security-severity` score of the `java/overly-large-range` query from 5.0 to 4.0 to better reflect its impact. +* Reduced the `security-severity` score of the `java/insecure-cookie` query from 5.0 to 4.0 to better reflect its impact. \ No newline at end of file diff --git a/javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql b/javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql index 582a8975c8f..c5435e34758 100644 --- a/javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql +++ b/javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql @@ -4,7 +4,7 @@ * This may allow an attacker to bypass a filter or sanitizer. * @kind problem * @problem.severity warning - * @security-severity 5.0 + * @security-severity 4.0 * @precision high * @id js/overly-large-range * @tags correctness diff --git a/javascript/ql/src/Security/CWE-079/XssThroughDom.ql b/javascript/ql/src/Security/CWE-079/XssThroughDom.ql index e690e2bab28..fb8f32cbaca 100644 --- a/javascript/ql/src/Security/CWE-079/XssThroughDom.ql +++ b/javascript/ql/src/Security/CWE-079/XssThroughDom.ql @@ -4,7 +4,7 @@ * can lead to a cross-site scripting vulnerability. * @kind path-problem * @problem.severity warning - * @security-severity 6.1 + * @security-severity 7.8 * @precision high * @id js/xss-through-dom * @tags security diff --git a/javascript/ql/src/change-notes/2025-10-22-adjust-query-severity.md b/javascript/ql/src/change-notes/2025-10-22-adjust-query-severity.md new file mode 100644 index 00000000000..ca81037f44b --- /dev/null +++ b/javascript/ql/src/change-notes/2025-10-22-adjust-query-severity.md @@ -0,0 +1,5 @@ +--- +category: queryMetadata +--- +* Increased the `security-severity` score of the `js/xss-through-dom` query from 6.1 to 7.8 to align with other XSS queries. +* Reduced the `security-severity` score of the `js/overly-large-range` query from 5.0 to 4.0 to better reflect its impact. \ No newline at end of file diff --git a/python/ql/src/Security/CWE-020/OverlyLargeRange.ql b/python/ql/src/Security/CWE-020/OverlyLargeRange.ql index 25acc667430..94bc74238bc 100644 --- a/python/ql/src/Security/CWE-020/OverlyLargeRange.ql +++ b/python/ql/src/Security/CWE-020/OverlyLargeRange.ql @@ -4,7 +4,7 @@ * This may allow an attacker to bypass a filter or sanitizer. * @kind problem * @problem.severity warning - * @security-severity 5.0 + * @security-severity 4.0 * @precision high * @id py/overly-large-range * @tags correctness diff --git a/python/ql/src/change-notes/2025-10-22-adjust-query-severity.md b/python/ql/src/change-notes/2025-10-22-adjust-query-severity.md new file mode 100644 index 00000000000..bc314358a6f --- /dev/null +++ b/python/ql/src/change-notes/2025-10-22-adjust-query-severity.md @@ -0,0 +1,4 @@ +--- +category: queryMetadata +--- +* Reduced the `security-severity` score of the `py/overly-large-range` query from 5.0 to 4.0 to better reflect its impact. \ No newline at end of file diff --git a/ruby/ql/src/change-notes/2025-10-22-adjust-query-severity.md b/ruby/ql/src/change-notes/2025-10-22-adjust-query-severity.md new file mode 100644 index 00000000000..4da73769e27 --- /dev/null +++ b/ruby/ql/src/change-notes/2025-10-22-adjust-query-severity.md @@ -0,0 +1,4 @@ +--- +category: queryMetadata +--- +* Reduced the `security-severity` score of the `rb/overly-large-range` query from 5.0 to 4.0 to better reflect its impact. \ No newline at end of file diff --git a/ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql b/ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql index 62b088355b5..6f0f529a31d 100644 --- a/ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql +++ b/ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql @@ -4,7 +4,7 @@ * This may allow an attacker to bypass a filter or sanitizer. * @kind problem * @problem.severity warning - * @security-severity 5.0 + * @security-severity 4.0 * @precision high * @id rb/overly-large-range * @tags correctness