-
Notifications
You must be signed in to change notification settings - Fork 1.9k
Adjust query severity ratings #20671
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR adjusts security severity ratings for several queries across multiple languages to better align with their actual security impact. The XSS query is upgraded while OverlyLargeRange and insecure cookie queries are downgraded.
- Increased
js/xss-through-domseverity from 6.1 to 7.8 to align with other XSS queries - Reduced
overly-large-rangequery severity from 5.0 to 4.0 across Java, JavaScript, Python, and Ruby - Reduced
java/insecure-cookieseverity from 5.0 to 4.0
Reviewed Changes
Copilot reviewed 10 out of 10 changed files in this pull request and generated no comments.
Show a summary per file
| File | Description |
|---|---|
| javascript/ql/src/Security/CWE-079/XssThroughDom.ql | Increased security severity from 6.1 to 7.8 |
| javascript/ql/src/Security/CWE-020/OverlyLargeRange.ql | Reduced security severity from 5.0 to 4.0 |
| python/ql/src/Security/CWE-020/OverlyLargeRange.ql | Reduced security severity from 5.0 to 4.0 |
| ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.ql | Reduced security severity from 5.0 to 4.0 |
| java/ql/src/Security/CWE/CWE-020/OverlyLargeRange.ql | Reduced security severity from 5.0 to 4.0 |
| java/ql/src/Security/CWE/CWE-614/InsecureCookie.ql | Reduced security severity from 5.0 to 4.0 |
| javascript/ql/src/change-notes/2025-10-22-adjust-query-severity.md | Documents XSS and OverlyLargeRange severity changes for JavaScript |
| python/ql/src/change-notes/2025-10-22-adjust-query-severity.md | Documents OverlyLargeRange severity change for Python |
| ruby/ql/src/change-notes/2025-10-22-adjust-query-severity.md | Documents OverlyLargeRange severity change for Ruby |
| java/ql/src/change-notes/2025-10-22-adjust-query-severity.md | Documents OverlyLargeRange and insecure-cookie severity changes for Java |
|
Please can you list the motivation for changing these in the PR description, so it can be easily found in future. |
js/xss-through-domto align with the severity levels of other XSS queries.OverlyLargeRangequery ratings, as this is primarily a code quality issue; an overly large range rarely leads to a direct security vulnerability.java/insecure-cookieseverity because, with widespread HTTPS adoption and stricter browser security, missing the secure flag on cookies now poses minimal real-world risk.