CVE-2025-64758: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DependencyTrack frontend
@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Since version 4.12.0, Dependency-Track users with the SYSTEM_CONFIGURATION permission can configure a "welcome message", which is HTML that is to be rendered on the login page for branding purposes. When rendering the welcome message, Dependency-Track versions before 4.13.6 did not properly sanitize the HTML, allowing arbitrary JavaScript to be executed. Users with the SYSTEM_CONFIGURATION permission (i.e., administrators), can exploit this weakness to execute arbitrary JavaScript for users browsing to the login page. The issue has been fixed in version 4.13.6.
AI Analysis
Technical Summary
CVE-2025-64758 is a Cross-Site Scripting (CWE-79) vulnerability affecting the frontend component of DependencyTrack, an open-source software composition analysis platform widely used for managing software supply chain risks. Since version 4.12.0, DependencyTrack allows users with SYSTEM_CONFIGURATION permissions to set a custom HTML "welcome message" displayed on the login page for branding. However, in versions prior to 4.13.6, this HTML content was not properly sanitized before rendering, enabling injection and execution of arbitrary JavaScript code in the context of the login page. Exploitation requires an attacker to have administrator-level access to configure the malicious welcome message. When a user visits the login page, the injected script executes, potentially stealing session tokens, performing actions on behalf of the user, or delivering further payloads. The vulnerability affects versions from 4.12.0 up to but not including 4.13.6, and was publicly disclosed on November 17, 2025. The CVSS v3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, and user interaction needed. No known active exploits have been reported. The issue has been resolved by proper HTML sanitization in version 4.13.6. This vulnerability is significant because DependencyTrack is often used in environments managing critical software supply chains, where trust and integrity are paramount.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and potentially sensitive configuration data within DependencyTrack. If exploited, malicious scripts could hijack administrator sessions or manipulate the application interface, undermining trust in the software supply chain risk management process. This could lead to unauthorized access to vulnerability data, component inventories, or risk assessments, which are critical for compliance with regulations such as the EU Cybersecurity Act and NIS Directive. Although the vulnerability does not directly impact availability, the indirect consequences of compromised integrity and confidentiality could disrupt software supply chain security workflows. Organizations with stringent software supply chain security requirements, especially in sectors like finance, healthcare, and critical infrastructure, are at higher risk. The requirement for administrator privileges limits the attack surface but insider threats or compromised admin accounts could be leveraged. The lack of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks.
Mitigation Recommendations
European organizations should immediately upgrade DependencyTrack to version 4.13.6 or later to ensure the vulnerability is patched. Until upgrade, restrict SYSTEM_CONFIGURATION permissions strictly to trusted administrators and monitor for unusual configuration changes, especially to the welcome message. Implement Content Security Policy (CSP) headers on the DependencyTrack web server to limit the execution of unauthorized scripts. Conduct regular audits of the welcome message content and other configurable HTML fields to detect malicious code. Employ multi-factor authentication (MFA) for administrator accounts to reduce the risk of credential compromise. Monitor logs for suspicious activity related to configuration changes or login page access. Educate administrators about the risks of injecting untrusted HTML content. Finally, integrate DependencyTrack usage within a broader security monitoring framework to detect anomalous behavior that could indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-64758: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DependencyTrack frontend
Description
@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Since version 4.12.0, Dependency-Track users with the SYSTEM_CONFIGURATION permission can configure a "welcome message", which is HTML that is to be rendered on the login page for branding purposes. When rendering the welcome message, Dependency-Track versions before 4.13.6 did not properly sanitize the HTML, allowing arbitrary JavaScript to be executed. Users with the SYSTEM_CONFIGURATION permission (i.e., administrators), can exploit this weakness to execute arbitrary JavaScript for users browsing to the login page. The issue has been fixed in version 4.13.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-64758 is a Cross-Site Scripting (CWE-79) vulnerability affecting the frontend component of DependencyTrack, an open-source software composition analysis platform widely used for managing software supply chain risks. Since version 4.12.0, DependencyTrack allows users with SYSTEM_CONFIGURATION permissions to set a custom HTML "welcome message" displayed on the login page for branding. However, in versions prior to 4.13.6, this HTML content was not properly sanitized before rendering, enabling injection and execution of arbitrary JavaScript code in the context of the login page. Exploitation requires an attacker to have administrator-level access to configure the malicious welcome message. When a user visits the login page, the injected script executes, potentially stealing session tokens, performing actions on behalf of the user, or delivering further payloads. The vulnerability affects versions from 4.12.0 up to but not including 4.13.6, and was publicly disclosed on November 17, 2025. The CVSS v3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, and user interaction needed. No known active exploits have been reported. The issue has been resolved by proper HTML sanitization in version 4.13.6. This vulnerability is significant because DependencyTrack is often used in environments managing critical software supply chains, where trust and integrity are paramount.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and potentially sensitive configuration data within DependencyTrack. If exploited, malicious scripts could hijack administrator sessions or manipulate the application interface, undermining trust in the software supply chain risk management process. This could lead to unauthorized access to vulnerability data, component inventories, or risk assessments, which are critical for compliance with regulations such as the EU Cybersecurity Act and NIS Directive. Although the vulnerability does not directly impact availability, the indirect consequences of compromised integrity and confidentiality could disrupt software supply chain security workflows. Organizations with stringent software supply chain security requirements, especially in sectors like finance, healthcare, and critical infrastructure, are at higher risk. The requirement for administrator privileges limits the attack surface but insider threats or compromised admin accounts could be leveraged. The lack of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks.
Mitigation Recommendations
European organizations should immediately upgrade DependencyTrack to version 4.13.6 or later to ensure the vulnerability is patched. Until upgrade, restrict SYSTEM_CONFIGURATION permissions strictly to trusted administrators and monitor for unusual configuration changes, especially to the welcome message. Implement Content Security Policy (CSP) headers on the DependencyTrack web server to limit the execution of unauthorized scripts. Conduct regular audits of the welcome message content and other configurable HTML fields to detect malicious code. Employ multi-factor authentication (MFA) for administrator accounts to reduce the risk of credential compromise. Monitor logs for suspicious activity related to configuration changes or login page access. Educate administrators about the risks of injecting untrusted HTML content. Finally, integrate DependencyTrack usage within a broader security monitoring framework to detect anomalous behavior that could indicate exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T22:29:34.875Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691b5ce0c08982598af07859
Added to database: 11/17/2025, 5:35:28 PM
Last enriched: 11/24/2025, 6:30:49 PM
Last updated: 1/7/2026, 6:10:41 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.