Current Behavior
When using Dependency-Track with Trivy as the analyzer, vulnerabilities that were previously reported by Trivy remain associated with components even after Trivy no longer reports them in subsequent scans.
This leads to stale / false-positive findings persisting indefinitely, despite being resolved or reverted in the upstream Trivy vulnerability database.
Steps to Reproduce
- Upload a BOM containing component C
- Trivy reports vulnerability V (e.g. CVE-2025-15467) for component C
→ Dependency-Track creates:
- Vulnerability record
- Finding attribution linking C ↔ V
- Later, Trivy vulnerability DB updates and V is no longer reported for component C
(e.g. false positive reverted, advisory withdrawn)
- Re-upload the same BOM (or updated BOM still containing component C)
- Dependency-Track runs Trivy analysis again
- Finding attribution for C ↔ V remains active
The following components previously had a critical vulnerability reported by Trivy, which was later reverted upstream:
openssl-provider-legacy 3.5.4-1~deb13u1
libcrypto3 3.5.4-r0
CVE-2025-15467
After Trivy stopped reporting this CVE, Dependency-Track continued to show it as active.
Expected Behavior
Dependency-Track should reconcile analyzer results per scan:
- If an analyzer (Trivy) no longer reports a vulnerability for a component, the existing finding should be:
- Removed from the component’s active findings
This reconciliation should be scoped by:
- Component
- Analyzer
- Scan run
The vulnerability record itself can remain, but the association must reflect current analyzer output.
Dependency-Track Version
4.13.6
Dependency-Track Distribution
Container Image
Database Server
PostgreSQL
Database Server Version
No response
Browser
Google Chrome
Checklist
Current Behavior
When using Dependency-Track with Trivy as the analyzer, vulnerabilities that were previously reported by Trivy remain associated with components even after Trivy no longer reports them in subsequent scans.
This leads to stale / false-positive findings persisting indefinitely, despite being resolved or reverted in the upstream Trivy vulnerability database.
Steps to Reproduce
→ Dependency-Track creates:
(e.g. false positive reverted, advisory withdrawn)
The following components previously had a critical vulnerability reported by Trivy, which was later reverted upstream:
openssl-provider-legacy 3.5.4-1~deb13u1libcrypto3 3.5.4-r0CVE-2025-15467After Trivy stopped reporting this CVE, Dependency-Track continued to show it as active.
Expected Behavior
Dependency-Track should reconcile analyzer results per scan:
This reconciliation should be scoped by:
The vulnerability record itself can remain, but the association must reflect current analyzer output.
Dependency-Track Version
4.13.6
Dependency-Track Distribution
Container Image
Database Server
PostgreSQL
Database Server Version
No response
Browser
Google Chrome
Checklist