CVE-2025-61776
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-07

Last updated on: 2025-10-08

Assigner: GitHub, Inc.

Description
Dependency-Track is a component analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.13.5, Dependency-Track may send credentials meant for a private NuGet repository to `api.nuget.org` via the HTTP `Authorization` header, and may disclose names and versions of components marked as internal to `api.nuget.org`. This can happen if the Dependency-Track instance contains .NET components, a custom NuGet repository has been configured, the custom repository has been configured with authentication credentials, and the repository server does not provide `PackageBaseAddress` resource in its service index. The issue has been fixed in Dependency-Track 4.13.5. Some workarounds are avaialble. Disable custom NuGet repositories until the patch has been applied, invalidate the previously used credentials, and generate new credentials for usage after the patch has been applied.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-07
Last Modified
2025-10-08
Generated
2026-05-07
AI Q&A
2025-10-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dependency-track dependency-track *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Dependency-Track prior to version 4.13.5 causes the software to potentially send authentication credentials intended for a private NuGet repository to the public api.nuget.org via the HTTP Authorization header. Additionally, it may disclose names and versions of components marked as internal to api.nuget.org. This occurs under specific conditions involving .NET components, custom NuGet repositories configured with authentication, and the absence of a PackageBaseAddress resource in the repository's service index.


How can this vulnerability impact me? :

The vulnerability can lead to unintended disclosure of sensitive authentication credentials and internal component information to a public server (api.nuget.org). This could allow unauthorized parties to gain insight into internal software components and potentially misuse the leaked credentials, increasing the risk of supply chain attacks or unauthorized access.


What immediate steps should I take to mitigate this vulnerability?

Immediate steps to mitigate this vulnerability include disabling custom NuGet repositories until Dependency-Track is updated to version 4.13.5 or later, invalidating any previously used credentials, and generating new credentials to be used after applying the patch.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart