CVE-2025-61776: CWE-522: Insufficiently Protected Credentials in DependencyTrack dependency-track
Dependency-Track is a component analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.13.5, Dependency-Track may send credentials meant for a private NuGet repository to `api.nuget.org` via the HTTP `Authorization` header, and may disclose names and versions of components marked as internal to `api.nuget.org`. This can happen if the Dependency-Track instance contains .NET components, a custom NuGet repository has been configured, the custom repository has been configured with authentication credentials, and the repository server does not provide `PackageBaseAddress` resource in its service index. The issue has been fixed in Dependency-Track 4.13.5. Some workarounds are avaialble. Disable custom NuGet repositories until the patch has been applied, invalidate the previously used credentials, and generate new credentials for usage after the patch has been applied.
AI Analysis
Technical Summary
Dependency-Track is a software composition analysis platform designed to help organizations manage risks in their software supply chains by tracking component usage and vulnerabilities. CVE-2025-61776 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Dependency-Track versions prior to 4.13.5. The flaw arises when Dependency-Track instances that include .NET components are configured to use custom NuGet repositories requiring authentication, and these repositories do not provide a PackageBaseAddress resource in their service index. Under these conditions, Dependency-Track may mistakenly send the authentication credentials intended for the private NuGet repository to the public NuGet API endpoint (api.nuget.org) via the HTTP Authorization header. This results in unintended credential exposure to an external service. Furthermore, the vulnerability causes disclosure of internal component names and versions marked as internal, potentially leaking sensitive information about the software supply chain. The vulnerability requires no privileges to exploit but does require user interaction, such as triggering Dependency-Track to query the NuGet repositories. The CVSS 3.1 base score is 4.7 (medium), reflecting low impact on confidentiality with no impact on integrity or availability. The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component. The issue has been addressed in Dependency-Track version 4.13.5. Workarounds include disabling custom NuGet repositories until patching is applied and rotating any credentials previously used to prevent unauthorized access. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability primarily risks the confidentiality of authentication credentials used for private NuGet repositories. Leakage of these credentials to a public endpoint could allow unauthorized parties to access private package repositories, potentially exposing proprietary or sensitive software components. This exposure could facilitate further supply chain attacks or intellectual property theft. While the vulnerability does not directly impact system integrity or availability, the compromise of private repository credentials undermines trust in the software supply chain and could lead to indirect impacts if attackers leverage the access for malicious purposes. Organizations heavily reliant on .NET components and custom NuGet repositories in their development pipelines are particularly vulnerable. The risk is heightened for enterprises with stringent compliance requirements around data protection and software integrity, such as those in finance, healthcare, and critical infrastructure sectors prevalent in Europe.
Mitigation Recommendations
European organizations should immediately upgrade Dependency-Track instances to version 4.13.5 or later to remediate the vulnerability. Until patching is complete, disable all custom NuGet repositories configured with authentication to prevent credential leakage. Organizations must invalidate and rotate any credentials previously used with these custom repositories to mitigate the risk of unauthorized access. Review and audit Dependency-Track configurations to ensure no unintended credential exposure occurs. Implement network monitoring to detect unusual outbound traffic to api.nuget.org or other unexpected endpoints. Enforce strict access controls and logging around Dependency-Track and NuGet repository credentials. Additionally, consider isolating Dependency-Track instances within secure network segments to limit exposure. Educate development and DevOps teams about the risk and ensure secure handling of repository credentials. Finally, integrate Dependency-Track updates into regular patch management processes to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2025-61776: CWE-522: Insufficiently Protected Credentials in DependencyTrack dependency-track
Description
Dependency-Track is a component analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.13.5, Dependency-Track may send credentials meant for a private NuGet repository to `api.nuget.org` via the HTTP `Authorization` header, and may disclose names and versions of components marked as internal to `api.nuget.org`. This can happen if the Dependency-Track instance contains .NET components, a custom NuGet repository has been configured, the custom repository has been configured with authentication credentials, and the repository server does not provide `PackageBaseAddress` resource in its service index. The issue has been fixed in Dependency-Track 4.13.5. Some workarounds are avaialble. Disable custom NuGet repositories until the patch has been applied, invalidate the previously used credentials, and generate new credentials for usage after the patch has been applied.
AI-Powered Analysis
Technical Analysis
Dependency-Track is a software composition analysis platform designed to help organizations manage risks in their software supply chains by tracking component usage and vulnerabilities. CVE-2025-61776 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Dependency-Track versions prior to 4.13.5. The flaw arises when Dependency-Track instances that include .NET components are configured to use custom NuGet repositories requiring authentication, and these repositories do not provide a PackageBaseAddress resource in their service index. Under these conditions, Dependency-Track may mistakenly send the authentication credentials intended for the private NuGet repository to the public NuGet API endpoint (api.nuget.org) via the HTTP Authorization header. This results in unintended credential exposure to an external service. Furthermore, the vulnerability causes disclosure of internal component names and versions marked as internal, potentially leaking sensitive information about the software supply chain. The vulnerability requires no privileges to exploit but does require user interaction, such as triggering Dependency-Track to query the NuGet repositories. The CVSS 3.1 base score is 4.7 (medium), reflecting low impact on confidentiality with no impact on integrity or availability. The scope is changed (S:C) because the vulnerability affects resources beyond the initially vulnerable component. The issue has been addressed in Dependency-Track version 4.13.5. Workarounds include disabling custom NuGet repositories until patching is applied and rotating any credentials previously used to prevent unauthorized access. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability primarily risks the confidentiality of authentication credentials used for private NuGet repositories. Leakage of these credentials to a public endpoint could allow unauthorized parties to access private package repositories, potentially exposing proprietary or sensitive software components. This exposure could facilitate further supply chain attacks or intellectual property theft. While the vulnerability does not directly impact system integrity or availability, the compromise of private repository credentials undermines trust in the software supply chain and could lead to indirect impacts if attackers leverage the access for malicious purposes. Organizations heavily reliant on .NET components and custom NuGet repositories in their development pipelines are particularly vulnerable. The risk is heightened for enterprises with stringent compliance requirements around data protection and software integrity, such as those in finance, healthcare, and critical infrastructure sectors prevalent in Europe.
Mitigation Recommendations
European organizations should immediately upgrade Dependency-Track instances to version 4.13.5 or later to remediate the vulnerability. Until patching is complete, disable all custom NuGet repositories configured with authentication to prevent credential leakage. Organizations must invalidate and rotate any credentials previously used with these custom repositories to mitigate the risk of unauthorized access. Review and audit Dependency-Track configurations to ensure no unintended credential exposure occurs. Implement network monitoring to detect unusual outbound traffic to api.nuget.org or other unexpected endpoints. Enforce strict access controls and logging around Dependency-Track and NuGet repository credentials. Additionally, consider isolating Dependency-Track instances within secure network segments to limit exposure. Educate development and DevOps teams about the risk and ensure secure handling of repository credentials. Finally, integrate Dependency-Track updates into regular patch management processes to prevent recurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-30T19:43:49.901Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e566d0a677756fc99d8dcd
Added to database: 10/7/2025, 7:15:28 PM
Last enriched: 10/7/2025, 7:30:50 PM
Last updated: 11/22/2025, 12:57:54 AM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65947: CWE-400: Uncontrolled Resource Consumption in jzeuzs thread-amount
HighCVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code
HighCVE-2025-12678
UnknownCVE-2025-11933: CWE-20 Improper Input Validation in wofSSL wolfSSL
LowCVE-2025-65111: CWE-277: Insecure Inherited Permissions in authzed spicedb
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.