Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61776: CWE-522: Insufficiently Protected Credentials in DependencyTrack dependency-track

0
Medium
VulnerabilityCVE-2025-61776cvecve-2025-61776cwe-522
Published: Tue Oct 07 2025 (10/07/2025, 18:57:06 UTC)
Source: CVE Database V5
Vendor/Project: DependencyTrack
Product: dependency-track

Description

CVE-2025-61776 is a medium-severity vulnerability in Dependency-Track versions prior to 4. 13. 5 that causes insufficient protection of credentials used for custom NuGet repositories. When Dependency-Track instances contain . NET components and are configured with authenticated custom NuGet repositories lacking a PackageBaseAddress resource, credentials intended for the private repository may be inadvertently sent to the public api. nuget. org endpoint via the HTTP Authorization header. Additionally, internal component names and versions may be disclosed to this public endpoint. Exploitation requires no privileges but does require user interaction and can lead to credential leakage, potentially exposing private repository access. The vulnerability does not impact integrity or availability but compromises confidentiality.

AI-Powered Analysis

AILast updated: 10/07/2025, 19:30:50 UTC

Technical Analysis

Dependency-Track is a software composition analysis platform designed to help organizations manage risks in their software supply chains by tracking component usage and vulnerabilities. CVE-2025-61776 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Dependency-Track versions prior to 4.13.5. The flaw arises when Dependency-Track instances that include .NET components are configured to use custom NuGet repositories requiring authentication, and these repositories do not provide a PackageBaseAddress resource in their service index. Under these conditions, Dependency-Track may mistakenly send the authentication credentials intended for the private NuGet repository to the public NuGet API endpoint (api.nuget.org) via the HTTP Authorization header. This results in unintended credential exposure to an external service. Furthermore, the vulnerability causes disclosure of internal component names and versions marked as internal, potentially leaking sensitive information about the software supply chain. The vulnerability requires no privileges to exploit but does require user interaction, such as triggering Dependency-Track to query the NuGet repositories. The CVSS 3.1 base score is 4.7 (medium), reflecting low impact on confidentiality with no impact on integrity or availability. The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component. The issue has been addressed in Dependency-Track version 4.13.5. Workarounds include disabling custom NuGet repositories until patching is applied and rotating any credentials previously used to prevent unauthorized access. No known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, this vulnerability primarily risks the confidentiality of authentication credentials used for private NuGet repositories. Leakage of these credentials to a public endpoint could allow unauthorized parties to access private package repositories, potentially exposing proprietary or sensitive software components. This exposure could facilitate further supply chain attacks or intellectual property theft. While the vulnerability does not directly impact system integrity or availability, the compromise of private repository credentials undermines trust in the software supply chain and could lead to indirect impacts if attackers leverage the access for malicious purposes. Organizations heavily reliant on .NET components and custom NuGet repositories in their development pipelines are particularly vulnerable. The risk is heightened for enterprises with stringent compliance requirements around data protection and software integrity, such as those in finance, healthcare, and critical infrastructure sectors prevalent in Europe.

Mitigation Recommendations

European organizations should immediately upgrade Dependency-Track instances to version 4.13.5 or later to remediate the vulnerability. Until patching is complete, disable all custom NuGet repositories configured with authentication to prevent credential leakage. Organizations must invalidate and rotate any credentials previously used with these custom repositories to mitigate the risk of unauthorized access. Review and audit Dependency-Track configurations to ensure no unintended credential exposure occurs. Implement network monitoring to detect unusual outbound traffic to api.nuget.org or other unexpected endpoints. Enforce strict access controls and logging around Dependency-Track and NuGet repository credentials. Additionally, consider isolating Dependency-Track instances within secure network segments to limit exposure. Educate development and DevOps teams about the risk and ensure secure handling of repository credentials. Finally, integrate Dependency-Track updates into regular patch management processes to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-30T19:43:49.901Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e566d0a677756fc99d8dcd

Added to database: 10/7/2025, 7:15:28 PM

Last enriched: 10/7/2025, 7:30:50 PM

Last updated: 10/7/2025, 9:07:46 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats