@dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via Vulnerability Details
- Severity:
- Medium
Description
Due to the common practice of providing vulnerability details in markdown format, the Dependency-Track frontend renders them using the JavaScript library Showdown. Showdown does not have any XSS countermeasures built in), and versions before 4.6.1 of the Dependency-Track frontend did not encode or sanitize Showdown’s output.
Recommendation
Update the @dependencytrack/frontend package to the latest compatible version. Followings are version details:
- Affected version(s): < 4.6.1
- Patched version(s): 4.6.1
References
Related Issues
- @dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via welcome message - CVE-2025-64758
- rsshub vulnerable to Cross-site Scripting via unvalidated URL parameters - CVE-2023-26491
- Joplin Desktop App vulnerable to Cross-site Scripting - CVE-2022-45598
- Jodit Editor vulnerable to Cross-site Scripting (GHSA-42hx-vrxx-5r6v) - CVE-2022-23461
- Tags:
- npm
- @dependencytrack/frontend
Anything's wrong? Let us know Last updated on January 30, 2023