Home

Description

@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Since version 4.12.0, Dependency-Track users with the SYSTEM_CONFIGURATION permission can configure a "welcome message", which is HTML that is to be rendered on the login page for branding purposes. When rendering the welcome message, Dependency-Track versions before 4.13.6 did not properly sanitize the HTML, allowing arbitrary JavaScript to be executed. Users with the SYSTEM_CONFIGURATION permission (i.e., administrators), can exploit this weakness to execute arbitrary JavaScript for users browsing to the login page. The issue has been fixed in version 4.13.6.

PUBLISHED Reserved 2025-11-10 | Published 2025-11-17 | Updated 2025-11-17 | Assigner GitHub_M




MEDIUM: 4.8CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 4.12.0, < 4.13.6
affected

References

github.com/...ontend/security/advisories/GHSA-7xvh-c266-cfr5

github.com/DependencyTrack/frontend/pull/1378

github.com/DependencyTrack/frontend/pull/986

github.com/...ommit/8fd757be612eaf4f35eadbe4c334204d7bd711be

cve.org (CVE-2025-64758)

nvd.nist.gov (CVE-2025-64758)

Download JSON