CVE-2025-64758: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DependencyTrack frontend
@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Since version 4.12.0, Dependency-Track users with the SYSTEM_CONFIGURATION permission can configure a "welcome message", which is HTML that is to be rendered on the login page for branding purposes. When rendering the welcome message, Dependency-Track versions before 4.13.6 did not properly sanitize the HTML, allowing arbitrary JavaScript to be executed. Users with the SYSTEM_CONFIGURATION permission (i.e., administrators), can exploit this weakness to execute arbitrary JavaScript for users browsing to the login page. The issue has been fixed in version 4.13.6.
AI Analysis
Technical Summary
CVE-2025-64758 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the frontend component of DependencyTrack, an open-source software supply chain risk management platform. Since version 4.12.0, DependencyTrack allows administrators (users with SYSTEM_CONFIGURATION permission) to configure a customizable HTML welcome message displayed on the login page for branding purposes. In versions prior to 4.13.6, this HTML content was not properly sanitized before rendering, enabling injection of arbitrary JavaScript code. When an administrator configures malicious script within the welcome message, any user visiting the login page will have that script executed in their browser context. This can lead to theft of session tokens, redirection to malicious sites, or other client-side attacks compromising confidentiality and integrity. The vulnerability requires high privileges to configure the malicious payload and user interaction to trigger the script execution. The issue was addressed in DependencyTrack version 4.13.6 by implementing proper input sanitization and output encoding to neutralize potentially harmful scripts. No public exploits have been reported, but the vulnerability poses a risk in environments where multiple users access the login page and administrators may be compromised or negligent.
Potential Impact
For European organizations, this vulnerability could lead to targeted attacks against users accessing the DependencyTrack login page, potentially exposing session credentials or enabling further client-side attacks. Although exploitation requires administrator privileges to inject malicious scripts, the impact on confidentiality and integrity is significant since arbitrary JavaScript can be executed in the context of any user visiting the login page. This could facilitate lateral movement, credential theft, or phishing within organizations relying on DependencyTrack for software supply chain security. The availability impact is minimal as the vulnerability does not affect system uptime. Organizations in Europe using affected versions risk exposure of sensitive information and erosion of trust in their software supply chain risk management processes. Given the critical role of DependencyTrack in managing software component risks, exploitation could indirectly affect compliance with European data protection regulations such as GDPR if personal data is compromised.
Mitigation Recommendations
European organizations should immediately upgrade DependencyTrack to version 4.13.6 or later, where the vulnerability is fixed. Until upgrading, restrict SYSTEM_CONFIGURATION permissions strictly to trusted administrators and enforce strong access controls and monitoring on these accounts. Implement Content Security Policy (CSP) headers on the DependencyTrack web server to limit the execution of unauthorized scripts. Regularly audit the welcome message configuration for unauthorized or suspicious HTML content. Educate administrators on secure configuration practices and the risks of injecting untrusted HTML. Additionally, monitor web server logs and user activity for unusual access patterns or attempts to exploit the login page. Employ web application firewalls (WAFs) with rules targeting XSS payloads as a temporary protective measure. Finally, integrate DependencyTrack updates into the organization's patch management process to ensure timely remediation of future vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-64758: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DependencyTrack frontend
Description
@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Since version 4.12.0, Dependency-Track users with the SYSTEM_CONFIGURATION permission can configure a "welcome message", which is HTML that is to be rendered on the login page for branding purposes. When rendering the welcome message, Dependency-Track versions before 4.13.6 did not properly sanitize the HTML, allowing arbitrary JavaScript to be executed. Users with the SYSTEM_CONFIGURATION permission (i.e., administrators), can exploit this weakness to execute arbitrary JavaScript for users browsing to the login page. The issue has been fixed in version 4.13.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-64758 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the frontend component of DependencyTrack, an open-source software supply chain risk management platform. Since version 4.12.0, DependencyTrack allows administrators (users with SYSTEM_CONFIGURATION permission) to configure a customizable HTML welcome message displayed on the login page for branding purposes. In versions prior to 4.13.6, this HTML content was not properly sanitized before rendering, enabling injection of arbitrary JavaScript code. When an administrator configures malicious script within the welcome message, any user visiting the login page will have that script executed in their browser context. This can lead to theft of session tokens, redirection to malicious sites, or other client-side attacks compromising confidentiality and integrity. The vulnerability requires high privileges to configure the malicious payload and user interaction to trigger the script execution. The issue was addressed in DependencyTrack version 4.13.6 by implementing proper input sanitization and output encoding to neutralize potentially harmful scripts. No public exploits have been reported, but the vulnerability poses a risk in environments where multiple users access the login page and administrators may be compromised or negligent.
Potential Impact
For European organizations, this vulnerability could lead to targeted attacks against users accessing the DependencyTrack login page, potentially exposing session credentials or enabling further client-side attacks. Although exploitation requires administrator privileges to inject malicious scripts, the impact on confidentiality and integrity is significant since arbitrary JavaScript can be executed in the context of any user visiting the login page. This could facilitate lateral movement, credential theft, or phishing within organizations relying on DependencyTrack for software supply chain security. The availability impact is minimal as the vulnerability does not affect system uptime. Organizations in Europe using affected versions risk exposure of sensitive information and erosion of trust in their software supply chain risk management processes. Given the critical role of DependencyTrack in managing software component risks, exploitation could indirectly affect compliance with European data protection regulations such as GDPR if personal data is compromised.
Mitigation Recommendations
European organizations should immediately upgrade DependencyTrack to version 4.13.6 or later, where the vulnerability is fixed. Until upgrading, restrict SYSTEM_CONFIGURATION permissions strictly to trusted administrators and enforce strong access controls and monitoring on these accounts. Implement Content Security Policy (CSP) headers on the DependencyTrack web server to limit the execution of unauthorized scripts. Regularly audit the welcome message configuration for unauthorized or suspicious HTML content. Educate administrators on secure configuration practices and the risks of injecting untrusted HTML. Additionally, monitor web server logs and user activity for unusual access patterns or attempts to exploit the login page. Employ web application firewalls (WAFs) with rules targeting XSS payloads as a temporary protective measure. Finally, integrate DependencyTrack updates into the organization's patch management process to ensure timely remediation of future vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T22:29:34.875Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691b5ce0c08982598af07859
Added to database: 11/17/2025, 5:35:28 PM
Last enriched: 11/17/2025, 5:41:39 PM
Last updated: 11/22/2025, 2:42:49 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighCVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.