Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64758: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DependencyTrack frontend

0
Medium
VulnerabilityCVE-2025-64758cvecve-2025-64758cwe-79
Published: Mon Nov 17 2025 (11/17/2025, 17:24:27 UTC)
Source: CVE Database V5
Vendor/Project: DependencyTrack
Product: frontend

Description

@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Since version 4.12.0, Dependency-Track users with the SYSTEM_CONFIGURATION permission can configure a "welcome message", which is HTML that is to be rendered on the login page for branding purposes. When rendering the welcome message, Dependency-Track versions before 4.13.6 did not properly sanitize the HTML, allowing arbitrary JavaScript to be executed. Users with the SYSTEM_CONFIGURATION permission (i.e., administrators), can exploit this weakness to execute arbitrary JavaScript for users browsing to the login page. The issue has been fixed in version 4.13.6.

AI-Powered Analysis

AILast updated: 11/24/2025, 18:30:49 UTC

Technical Analysis

CVE-2025-64758 is a Cross-Site Scripting (CWE-79) vulnerability affecting the frontend component of DependencyTrack, an open-source software composition analysis platform widely used for managing software supply chain risks. Since version 4.12.0, DependencyTrack allows users with SYSTEM_CONFIGURATION permissions to set a custom HTML "welcome message" displayed on the login page for branding. However, in versions prior to 4.13.6, this HTML content was not properly sanitized before rendering, enabling injection and execution of arbitrary JavaScript code in the context of the login page. Exploitation requires an attacker to have administrator-level access to configure the malicious welcome message. When a user visits the login page, the injected script executes, potentially stealing session tokens, performing actions on behalf of the user, or delivering further payloads. The vulnerability affects versions from 4.12.0 up to but not including 4.13.6, and was publicly disclosed on November 17, 2025. The CVSS v3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, and user interaction needed. No known active exploits have been reported. The issue has been resolved by proper HTML sanitization in version 4.13.6. This vulnerability is significant because DependencyTrack is often used in environments managing critical software supply chains, where trust and integrity are paramount.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and potentially sensitive configuration data within DependencyTrack. If exploited, malicious scripts could hijack administrator sessions or manipulate the application interface, undermining trust in the software supply chain risk management process. This could lead to unauthorized access to vulnerability data, component inventories, or risk assessments, which are critical for compliance with regulations such as the EU Cybersecurity Act and NIS Directive. Although the vulnerability does not directly impact availability, the indirect consequences of compromised integrity and confidentiality could disrupt software supply chain security workflows. Organizations with stringent software supply chain security requirements, especially in sectors like finance, healthcare, and critical infrastructure, are at higher risk. The requirement for administrator privileges limits the attack surface but insider threats or compromised admin accounts could be leveraged. The lack of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks.

Mitigation Recommendations

European organizations should immediately upgrade DependencyTrack to version 4.13.6 or later to ensure the vulnerability is patched. Until upgrade, restrict SYSTEM_CONFIGURATION permissions strictly to trusted administrators and monitor for unusual configuration changes, especially to the welcome message. Implement Content Security Policy (CSP) headers on the DependencyTrack web server to limit the execution of unauthorized scripts. Conduct regular audits of the welcome message content and other configurable HTML fields to detect malicious code. Employ multi-factor authentication (MFA) for administrator accounts to reduce the risk of credential compromise. Monitor logs for suspicious activity related to configuration changes or login page access. Educate administrators about the risks of injecting untrusted HTML content. Finally, integrate DependencyTrack usage within a broader security monitoring framework to detect anomalous behavior that could indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T22:29:34.875Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b5ce0c08982598af07859

Added to database: 11/17/2025, 5:35:28 PM

Last enriched: 11/24/2025, 6:30:49 PM

Last updated: 1/7/2026, 6:10:41 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats