|
| 1 | +.. _codeql-cli-2.25.2: |
| 2 | + |
| 3 | +========================== |
| 4 | +CodeQL 2.25.2 (2026-04-15) |
| 5 | +========================== |
| 6 | + |
| 7 | +.. contents:: Contents |
| 8 | + :depth: 2 |
| 9 | + :local: |
| 10 | + :backlinks: none |
| 11 | + |
| 12 | +This is an overview of changes in the CodeQL CLI and relevant CodeQL query and library packs. For additional updates on changes to the CodeQL code scanning experience, check out the `code scanning section on the GitHub blog <https://github.blog/tag/code-scanning/>`__, `relevant GitHub Changelog updates <https://github.blog/changelog/label/application-security/>`__, `changes in the CodeQL extension for Visual Studio Code <https://marketplace.visualstudio.com/items/GitHub.vscode-codeql/changelog>`__, and the `CodeQL Action changelog <https://github.com/github/codeql-action/blob/main/CHANGELOG.md>`__. |
| 13 | + |
| 14 | +Security Coverage |
| 15 | +----------------- |
| 16 | + |
| 17 | +CodeQL 2.25.2 runs a total of 492 security queries when configured with the Default suite (covering 166 CWE). The Extended suite enables an additional 135 queries (covering 35 more CWE). 1 security query has been added with this release. |
| 18 | + |
| 19 | +CodeQL CLI |
| 20 | +---------- |
| 21 | + |
| 22 | +Miscellaneous |
| 23 | +~~~~~~~~~~~~~ |
| 24 | + |
| 25 | +* The build of Eclipse Temurin OpenJDK that is used to run the CodeQL CLI has been updated to version 21.0.10. |
| 26 | + |
| 27 | +Query Packs |
| 28 | +----------- |
| 29 | + |
| 30 | +Major Analysis Improvements |
| 31 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 32 | + |
| 33 | +C# |
| 34 | +"" |
| 35 | + |
| 36 | +* The :code:`cs/constant-condition` query has been simplified. The query no longer reports trivially constant conditions as they were found to generally be intentional. As a result, it should now produce fewer false positives. Additionally, the simplification means that it now reports all the results that :code:`cs/constant-comparison` used to report, and as consequence, that query has been deleted. |
| 37 | + |
| 38 | +Python |
| 39 | +"""""" |
| 40 | + |
| 41 | +* Several quality queries have been ported away from using the legacy points-to library. This may lead to changes in alerts. |
| 42 | + |
| 43 | +Minor Analysis Improvements |
| 44 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 45 | + |
| 46 | +C/C++ |
| 47 | +""""" |
| 48 | + |
| 49 | +* The "Extraction warnings" (:code:`cpp/diagnostics/extraction-warnings`) diagnostics query no longer yields :code:`ExtractionRecoverableWarning`\ s for :code:`build-mode: none` databases. The results were found to significantly increase the sizes of the produced SARIF files, making them unprocessable in some cases. |
| 50 | +* Fixed an issue with the "Suspicious add with sizeof" (:code:`cpp/suspicious-add-sizeof`) query causing false positive results in :code:`build-mode: none` databases. |
| 51 | +* Fixed an issue with the "Uncontrolled format string" (:code:`cpp/tainted-format-string`) query involving certain kinds of formatting function implementations. |
| 52 | +* Fixed an issue with the "Wrong type of arguments to formatting function" (:code:`cpp/wrong-type-format-argument`) query causing false positive results in :code:`build-mode: none` databases. |
| 53 | +* Fixed an issue with the "Multiplication result converted to larger type" (:code:`cpp/integer-multiplication-cast-to-long`) query causing false positive results in :code:`build-mode: none` databases. |
| 54 | + |
| 55 | +Query Metadata Changes |
| 56 | +~~~~~~~~~~~~~~~~~~~~~~ |
| 57 | + |
| 58 | +C/C++ |
| 59 | +""""" |
| 60 | + |
| 61 | +* The :code:`@security-severity` metadata of :code:`cpp/cgi-xss` has been increased from 6.1 (medium) to 7.8 (high). |
| 62 | + |
| 63 | +C# |
| 64 | +"" |
| 65 | + |
| 66 | +* The :code:`@security-severity` metadata of :code:`cs/log-forging` has been reduced from 7.8 (high) to 6.1 (medium). |
| 67 | +* The :code:`@security-severity` metadata of :code:`cs/web/xss` has been increased from 6.1 (medium) to 7.8 (high). |
| 68 | + |
| 69 | +Golang |
| 70 | +"""""" |
| 71 | + |
| 72 | +* The :code:`@security-severity` metadata of :code:`go/log-injection` has been reduced from 7.8 (high) to 6.1 (medium). |
| 73 | +* The :code:`@security-severity` metadata of :code:`go/html-template-escaping-bypass-xss`, :code:`go/reflected-xss` and :code:`go/stored-xss` has been increased from 6.1 (medium) to 7.8 (high). |
| 74 | + |
| 75 | +Java/Kotlin |
| 76 | +""""""""""" |
| 77 | + |
| 78 | +* The :code:`@security-severity` metadata of :code:`java/log-injection` has been reduced from 7.8 (high) to 6.1 (medium). |
| 79 | +* The :code:`@security-severity` metadata of :code:`java/android/webview-addjavascriptinterface`, :code:`java/android/websettings-javascript-enabled` and :code:`java/xss` has been increased from 6.1 (medium) to 7.8 (high). |
| 80 | + |
| 81 | +Python |
| 82 | +"""""" |
| 83 | + |
| 84 | +* The :code:`@security-severity` metadata of :code:`py/log-injection` has been reduced from 7.8 (high) to 6.1 (medium). |
| 85 | +* The :code:`@security-severity` metadata of :code:`py/jinja2/autoescape-false` and :code:`py/reflective-xss` has been increased from 6.1 (medium) to 7.8 (high). |
| 86 | + |
| 87 | +Ruby |
| 88 | +"""" |
| 89 | + |
| 90 | +* The :code:`@security-severity` metadata of :code:`rb/log-injection` has been reduced from 7.8 (high) to 6.1 (medium). |
| 91 | +* The :code:`@security-severity` metadata of :code:`rb/reflected-xss`, :code:`rb/stored-xss` and :code:`rb/html-constructed-from-input` has been increased from 6.1 (medium) to 7.8 (high). |
| 92 | + |
| 93 | +Swift |
| 94 | +""""" |
| 95 | + |
| 96 | +* The :code:`@security-severity` metadata of :code:`swift/unsafe-webview-fetch` has been increased from 6.1 (medium) to 7.8 (high). |
| 97 | + |
| 98 | +Rust |
| 99 | +"""" |
| 100 | + |
| 101 | +* The :code:`@security-severity` metadata of :code:`rust/log-injection` has been increased from 2.6 (low) to 6.1 (medium). |
| 102 | +* The :code:`@security-severity` metadata of :code:`rust/xss` has been increased from 6.1 (medium) to 7.8 (high). |
| 103 | + |
| 104 | +Language Libraries |
| 105 | +------------------ |
| 106 | + |
| 107 | +Bug Fixes |
| 108 | +~~~~~~~~~ |
| 109 | + |
| 110 | +Python |
| 111 | +"""""" |
| 112 | + |
| 113 | +* Fixed the resolution of relative imports such as :code:`from . import helper` inside namespace packages (directories without an :code:`__init__.py` file), which previously did not work correctly, leading to missing flow. |
| 114 | + |
| 115 | +Breaking Changes |
| 116 | +~~~~~~~~~~~~~~~~ |
| 117 | + |
| 118 | +C/C++ |
| 119 | +""""" |
| 120 | + |
| 121 | +* The :code:`SourceModelCsv`, :code:`SinkModelCsv`, and :code:`SummaryModelCsv` classes and the associated CSV parsing infrastructure have been removed from :code:`ExternalFlow.qll`. New models should be added as :code:`.model.yml` files in the :code:`ext/` directory. |
| 122 | + |
| 123 | +Minor Analysis Improvements |
| 124 | +~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 125 | + |
| 126 | +C/C++ |
| 127 | +""""" |
| 128 | + |
| 129 | +* Added :code:`HttpReceiveHttpRequest`, :code:`HttpReceiveRequestEntityBody`, and :code:`HttpReceiveClientCertificate` from Win32's :code:`http.h` as remote flow sources. |
| 130 | +* Added dataflow through members initialized via non-static data member initialization (NSDMI). |
| 131 | + |
| 132 | +C# |
| 133 | +"" |
| 134 | + |
| 135 | +* The extractor no longer synthesizes expanded forms of compound assignments. This may have a small impact on the results of queries that explicitly or implicitly rely on the expanded form of compound assignments. |
| 136 | +* The :code:`cs/log-forging` query no longer treats arguments to extension methods with source code on :code:`ILogger` types as sinks. Instead, taint is tracked interprocedurally through extension method bodies, reducing false positives when extension methods sanitize input internally. |
| 137 | + |
| 138 | +Java/Kotlin |
| 139 | +""""""""""" |
| 140 | + |
| 141 | +* The :code:`java/tainted-arithmetic` query no longer flags arithmetic expressions that are used directly as an operand of a comparison in :code:`if`\ -condition bounds-checking patterns. For example, :code:`if (off + len > array.length)` is now recognized as a bounds check rather than a potentially vulnerable computation, reducing false positives. |
| 142 | +* The :code:`java/potentially-weak-cryptographic-algorithm` query no longer flags Elliptic Curve algorithms (:code:`EC`, :code:`ECDSA`, :code:`ECDH`, :code:`EdDSA`, :code:`Ed25519`, :code:`Ed448`, :code:`XDH`, :code:`X25519`, :code:`X448`), HMAC-based algorithms (:code:`HMACSHA1`, :code:`HMACSHA256`, :code:`HMACSHA384`, :code:`HMACSHA512`), or PBKDF2 key derivation as potentially insecure. These are modern, secure algorithms recommended by NIST and other standards bodies. This will reduce the number of false positives for this query. |
| 143 | +* The first argument of the method :code:`getInstance` of :code:`java.security.Signature` is now modeled as a sink for :code:`java/potentially-weak-cryptographic-algorithm`, :code:`java/weak-cryptographic-algorithm` and :code:`java/rsa-without-oaep`. This will increase the number of alerts for these queries. |
| 144 | +* Kotlin versions up to 2.3.20 are now supported. |
| 145 | + |
| 146 | +New Features |
| 147 | +~~~~~~~~~~~~ |
| 148 | + |
| 149 | +C/C++ |
| 150 | +""""" |
| 151 | + |
| 152 | +* Added a subclass :code:`MesonPrivateTestFile` of :code:`ConfigurationTestFile` that represents files created by Meson to test the build configuration. |
| 153 | +* Added a class :code:`ConstructorDirectFieldInit` to represent field initializations that occur in member initializer lists. |
| 154 | +* Added a class :code:`ConstructorDefaultFieldInit` to represent default field initializations. |
| 155 | +* Added a class :code:`DataFlow::IndirectParameterNode` to represent the indirection of a parameter as a dataflow node. |
| 156 | +* Added a predicate :code:`Node::asIndirectInstruction` which returns the :code:`Instruction` that defines the indirect dataflow node, if any. |
| 157 | +* Added a class :code:`IndirectUninitializedNode` to represent the indirection of an uninitialized local variable as a dataflow node. |
0 commit comments