CVE-2025-1686 Affecting dependency-track package, versions <4.13.5-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.08% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-DEPENDENCYTRACK-14886725
  • published7 Jan 2026
  • disclosed27 Feb 2025

Introduced: 27 Feb 2025

CVE-2025-1686  (opens in a new tab)

How to fix?

Upgrade Chainguard dependency-track to version 4.13.5-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dependency-track package and not the dependency-track package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ.

Workaround

This vulnerability can be mitigated by disabling the include macro in Pebble Templates:

java new PebbleEngine.Builder() .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder() .disallowedTokenParserTags(List.of("include")) .build()) .build();

CVSS Base Scores

version 3.1