Severity Levels
How CodeWall rates the severity of discovered vulnerabilities.
CodeWall assigns severity levels based on the potential impact and exploitability of each vulnerability, aligned with industry standards.
Severity scale
Critical
Vulnerabilities that can be exploited remotely with no authentication and lead to full system compromise, data breach, or complete loss of confidentiality, integrity, or availability.
Examples: Remote code execution, SQL injection with admin access, authentication bypass.
High
Vulnerabilities with significant impact that require minimal conditions to exploit.
Examples: Stored XSS in admin panels, privilege escalation, IDOR exposing sensitive data.
Medium
Vulnerabilities with moderate impact or that require specific conditions to exploit.
Examples: CSRF on sensitive actions, information disclosure of internal paths, missing security headers.
Low
Vulnerabilities with limited impact or that require significant preconditions.
Examples: Verbose error messages, minor information leakage, outdated but unexploitable software versions.
Informational
Observations that are not directly exploitable but may indicate areas for improvement.
Examples: Missing best-practice headers, software version disclosure, directory listing on non-sensitive paths.

