Description
@dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Since version 4.12.0, Dependency-Track users with the SYSTEM_CONFIGURATION permission can configure a "welcome message", which is HTML that is to be rendered on the login page for branding purposes. When rendering the welcome message, Dependency-Track versions before 4.13.6 did not properly sanitize the HTML, allowing arbitrary JavaScript to be executed. Users with the SYSTEM_CONFIGURATION permission (i.e., administrators), can exploit this weakness to execute arbitrary JavaScript for users browsing to the login page. The issue has been fixed in version 4.13.6.
Published: 2025-11-17
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7xvh-c266-cfr5 @dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via welcome message
History

Tue, 18 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Owasp
Owasp dependency-track Frontend
Vendors & Products Owasp
Owasp dependency-track Frontend

Mon, 17 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 17 Nov 2025 17:45:00 +0000

Type Values Removed Values Added
Description @dependencytrack/frontend is a Single Page Application (SPA) used in Dependency-Track, an open source Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Since version 4.12.0, Dependency-Track users with the SYSTEM_CONFIGURATION permission can configure a "welcome message", which is HTML that is to be rendered on the login page for branding purposes. When rendering the welcome message, Dependency-Track versions before 4.13.6 did not properly sanitize the HTML, allowing arbitrary JavaScript to be executed. Users with the SYSTEM_CONFIGURATION permission (i.e., administrators), can exploit this weakness to execute arbitrary JavaScript for users browsing to the login page. The issue has been fixed in version 4.13.6.
Title @dependencytrack/frontend Vulnerable to Persistent Cross-Site-Scripting via Welcome Message
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Owasp Dependency-track Frontend
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-17T21:05:16.691Z

Reserved: 2025-11-10T22:29:34.875Z

Link: CVE-2025-64758

cve-icon Vulnrichment

Updated: 2025-11-17T21:05:10.920Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-17T18:15:58.450

Modified: 2025-11-18T14:06:29.817

Link: CVE-2025-64758

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-18T09:06:06Z

Weaknesses