ZAP Scanning Report

Site: https://synapp-expertise-dev-v2.synapp.eu

Generated on Mon, 4 May 2026 09:05:29

ZAP Version: 2.17.0

ZAP by Checkmarx

Summary of Alerts

Risk Level Number of Alerts
High
1
Medium
2
Low
2
Informational
2
False Positives:
0

Insights

Level Reason Site Description Statistic
Low
Warning
ZAP warnings logged - see the zap.log file for details
2
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of responses with status code 2xx
100 %
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of endpoints with content type application/javascript
11 %
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of endpoints with content type application/json
11 %
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of endpoints with content type application/xml
11 %
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of endpoints with content type image/x-icon
11 %
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of endpoints with content type text/css
11 %
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of endpoints with content type text/html
44 %
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of endpoints with method GET
100 %
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Count of total endpoints
9
Info
Informational
https://synapp-expertise-dev-v2.synapp.eu
Percentage of slow responses
45 %

Summary of Sequences

For each step: result (Pass/Fail) - risk (of highest alert(s) for the step, if any).

Alerts

Name Risk Level Number of Instances
Vulnerable JS Library High 1
Content Security Policy (CSP) Header Not Set Medium 5
Sub Resource Integrity Attribute Missing Medium 5
Cross-Domain JavaScript Source File Inclusion Low 5
Timestamp Disclosure - Unix Low Systemic
Modern Web Application Informational 5
Re-examine Cache-control Directives Informational Systemic

Alert Detail

High
Vulnerable JS Library
Description
The identified library appears to be vulnerable.
URL https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Method GET
Parameter
Attack
Evidence return"[Axios v1.6.8] Transitional
Other Info
The identified library axios, version 1.6.8 is vulnerable.

CVE-2025-62718

CVE-2026-39865

CVE-2025-27152

CVE-2024-39338

CVE-2025-58754

CVE-2026-25639

CVE-2026-40175

https://github.com/axios/axios/issues/6463

https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57

https://github.com/axios/axios/pull/6539

https://github.com/axios/axios/pull/10661

https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.2

https://github.com/axios/axios/pull/10660

https://github.com/axios/axios/commit/fb3befb6daac6cad26b2e54094d0f2d9e47f24df

https://github.com/axios/axios/commit/d7ff1409c68168d3057fc3891f911b2b92616f9e

https://github.com/advisories/GHSA-jr5f-v2jv-69x6

https://github.com/axios/axios/releases/tag/v1.12.0

https://github.com/axios/axios/pull/7388

https://github.com/axios/axios/releases/tag/v1.13.2

https://github.com/axios/axios/pull/7369

https://github.com/axios/axios/releases/tag/v1.15.0

https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433

https://github.com/axios/axios/releases

https://github.com/axios/axios/releases/tag/v1.7.4

https://github.com/axios/axios/releases/tag/v1.8.2

https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj

https://github.com/axios/axios/security/advisories/GHSA-3p68-rc4w-qgx5

https://github.com/advisories/GHSA-8hc4-vh64-cxmj

https://datatracker.ietf.org/doc/html/rfc1034#section-3.1

https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593

https://github.com/axios/axios/releases/tag/v1.13.5

https://github.com/axios/axios/commit/6b6b605eaf73852fb2dae033f1e786155959de3a

https://nvd.nist.gov/vuln/detail/CVE-2024-39338

https://github.com/axios/axios/releases/tag/v0.30.3

https://github.com/axios/axios

https://github.com/axios/axios/commit/fb8eec214ce7744b5ca787f2c3b8339b2f54b00f

https://github.com/axios/axios/pull/6543

https://github.com/axios/axios/security/advisories/GHSA-jr5f-v2jv-69x6

https://github.com/axios/axios/commit/363185461b90b1b78845dc8a99a1f103d9b122a1

https://jeffhacks.com/advisories/2024/06/24/CVE-2024-39338.html

https://github.com/axios/axios/security/advisories/GHSA-fvcv-3m26-pcqx

https://nvd.nist.gov/vuln/detail/CVE-2025-27152

https://github.com/axios/axios/pull/7011

https://github.com/axios/axios/security/advisories/GHSA-qj83-cq47-w5f8
Instances 1
Solution
Upgrade to the latest version of the affected library.
Reference https://owasp.org/Top10/A06_2021-Vulnerable_and_Outdated_Components/
CWE Id 1395
WASC Id
Plugin Id 10003
Medium
Content Security Policy (CSP) Header Not Set
Description
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
URL https://synapp-expertise-dev-v2.synapp.eu
Node Name https://synapp-expertise-dev-v2.synapp.eu
Method GET
Parameter
Attack
Evidence
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/logo192.png
Node Name https://synapp-expertise-dev-v2.synapp.eu/logo192.png
Method GET
Parameter
Attack
Evidence
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Node Name https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Method GET
Parameter
Attack
Evidence
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/static/css
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/css
Method GET
Parameter
Attack
Evidence
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/static/js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js
Method GET
Parameter
Attack
Evidence
Other Info
Instances 5
Solution
Ensure that your web server, application server, load balancer, etc. is configured to set the Content-Security-Policy header.
Reference https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CSP
https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html
https://www.w3.org/TR/CSP/
https://w3c.github.io/webappsec-csp/
https://web.dev/articles/csp
https://caniuse.com/#feat=contentsecuritypolicy
https://content-security-policy.com/
CWE Id 693
WASC Id 15
Plugin Id 10038
Medium
Sub Resource Integrity Attribute Missing
Description
The integrity attribute is missing on a script or link tag served by an external server. The integrity tag prevents an attacker who have gained access to this server from injecting a malicious content.
URL https://synapp-expertise-dev-v2.synapp.eu
Node Name https://synapp-expertise-dev-v2.synapp.eu
Method GET
Parameter
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/logo192.png
Node Name https://synapp-expertise-dev-v2.synapp.eu/logo192.png
Method GET
Parameter
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Node Name https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Method GET
Parameter
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/static/css
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/css
Method GET
Parameter
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/static/js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js
Method GET
Parameter
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
Instances 5
Solution
Provide a valid integrity attribute to the tag.
Reference https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity
CWE Id 345
WASC Id 15
Plugin Id 90003
Low
Cross-Domain JavaScript Source File Inclusion
Description
The page includes one or more script files from a third-party domain.
URL https://synapp-expertise-dev-v2.synapp.eu
Node Name https://synapp-expertise-dev-v2.synapp.eu
Method GET
Parameter https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/logo192.png
Node Name https://synapp-expertise-dev-v2.synapp.eu/logo192.png
Method GET
Parameter https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Node Name https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Method GET
Parameter https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/static/css
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/css
Method GET
Parameter https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/static/js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js
Method GET
Parameter https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM
Attack
Evidence <script async src="https://www.googletagmanager.com/gtag/js?id=G-DVHYQKD0VM"></script>
Other Info
Instances 5
Solution
Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application.
Reference
CWE Id 829
WASC Id 15
Plugin Id 10017
Low
Timestamp Disclosure - Unix
Description
A timestamp was disclosed by the application/web server. - Unix
URL https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Method GET
Parameter
Attack
Evidence 1521486534
Other Info
1521486534, which evaluates to: 2018-03-19 19:08:54.
URL https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Method GET
Parameter
Attack
Evidence 1541459225
Other Info
1541459225, which evaluates to: 2018-11-05 23:07:05.
URL https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Method GET
Parameter
Attack
Evidence 1694144372
Other Info
1694144372, which evaluates to: 2023-09-08 03:39:32.
URL https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Method GET
Parameter
Attack
Evidence 1779033703
Other Info
1779033703, which evaluates to: 2026-05-17 16:01:43.
URL https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js/main.68f30ace.js
Method GET
Parameter
Attack
Evidence 1899447441
Other Info
1899447441, which evaluates to: 2030-03-11 08:17:21.
Instances Systemic
Solution
Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.
Reference https://cwe.mitre.org/data/definitions/200.html
CWE Id 497
WASC Id 13
Plugin Id 10096
Informational
Modern Web Application
Description
The application appears to be a modern web application. If you need to explore it automatically then the Ajax Spider may well be more effective than the standard one.
URL https://synapp-expertise-dev-v2.synapp.eu
Node Name https://synapp-expertise-dev-v2.synapp.eu
Method GET
Parameter
Attack
Evidence <script type="text/javascript">window.heapReadyCb=window.heapReadyCb||[],window.heap=window.heap||[],heap.load=function(e,a){window.heap.envId=e,window.heap.clientConfig=a=a||{},window.heap.clientConfig.shouldFetchServerConfig=!1;var r=document.createElement("script");r.type="text/javascript",r.async=!0,r.src="https://cdn.us.heap-api.com/config/"+e+"/heap_config.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(r,t);for(var n=["init","startTracking","stopTracking","track","resetIdentity","identify","getSessionId","getUserId","getIdentity","addUserProperties","addEventProperties","removeEventProperty","clearEventProperties","addAccountProperties","addAdapter","addTransformer","addTransformerFn","onReady","addPageviewProperties","removePageviewProperty","clearPageviewProperties","trackPageview"],i=function(e){return function(){var a=Array.prototype.slice.call(arguments,0);window.heapReadyCb.push({name:e,fn:function(){heap[e]&&heap[e].apply(heap,a)}})}},o=0;o<n.length;o++)heap[n[o]]=i(n[o])},heap.load("3712126961")</script>
Other Info
No links have been found while there are scripts, which is an indication that this is a modern web application.
URL https://synapp-expertise-dev-v2.synapp.eu/logo192.png
Node Name https://synapp-expertise-dev-v2.synapp.eu/logo192.png
Method GET
Parameter
Attack
Evidence <script type="text/javascript">window.heapReadyCb=window.heapReadyCb||[],window.heap=window.heap||[],heap.load=function(e,a){window.heap.envId=e,window.heap.clientConfig=a=a||{},window.heap.clientConfig.shouldFetchServerConfig=!1;var r=document.createElement("script");r.type="text/javascript",r.async=!0,r.src="https://cdn.us.heap-api.com/config/"+e+"/heap_config.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(r,t);for(var n=["init","startTracking","stopTracking","track","resetIdentity","identify","getSessionId","getUserId","getIdentity","addUserProperties","addEventProperties","removeEventProperty","clearEventProperties","addAccountProperties","addAdapter","addTransformer","addTransformerFn","onReady","addPageviewProperties","removePageviewProperty","clearPageviewProperties","trackPageview"],i=function(e){return function(){var a=Array.prototype.slice.call(arguments,0);window.heapReadyCb.push({name:e,fn:function(){heap[e]&&heap[e].apply(heap,a)}})}},o=0;o<n.length;o++)heap[n[o]]=i(n[o])},heap.load("3712126961")</script>
Other Info
No links have been found while there are scripts, which is an indication that this is a modern web application.
URL https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Node Name https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Method GET
Parameter
Attack
Evidence <script type="text/javascript">window.heapReadyCb=window.heapReadyCb||[],window.heap=window.heap||[],heap.load=function(e,a){window.heap.envId=e,window.heap.clientConfig=a=a||{},window.heap.clientConfig.shouldFetchServerConfig=!1;var r=document.createElement("script");r.type="text/javascript",r.async=!0,r.src="https://cdn.us.heap-api.com/config/"+e+"/heap_config.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(r,t);for(var n=["init","startTracking","stopTracking","track","resetIdentity","identify","getSessionId","getUserId","getIdentity","addUserProperties","addEventProperties","removeEventProperty","clearEventProperties","addAccountProperties","addAdapter","addTransformer","addTransformerFn","onReady","addPageviewProperties","removePageviewProperty","clearPageviewProperties","trackPageview"],i=function(e){return function(){var a=Array.prototype.slice.call(arguments,0);window.heapReadyCb.push({name:e,fn:function(){heap[e]&&heap[e].apply(heap,a)}})}},o=0;o<n.length;o++)heap[n[o]]=i(n[o])},heap.load("3712126961")</script>
Other Info
No links have been found while there are scripts, which is an indication that this is a modern web application.
URL https://synapp-expertise-dev-v2.synapp.eu/static/css
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/css
Method GET
Parameter
Attack
Evidence <script type="text/javascript">window.heapReadyCb=window.heapReadyCb||[],window.heap=window.heap||[],heap.load=function(e,a){window.heap.envId=e,window.heap.clientConfig=a=a||{},window.heap.clientConfig.shouldFetchServerConfig=!1;var r=document.createElement("script");r.type="text/javascript",r.async=!0,r.src="https://cdn.us.heap-api.com/config/"+e+"/heap_config.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(r,t);for(var n=["init","startTracking","stopTracking","track","resetIdentity","identify","getSessionId","getUserId","getIdentity","addUserProperties","addEventProperties","removeEventProperty","clearEventProperties","addAccountProperties","addAdapter","addTransformer","addTransformerFn","onReady","addPageviewProperties","removePageviewProperty","clearPageviewProperties","trackPageview"],i=function(e){return function(){var a=Array.prototype.slice.call(arguments,0);window.heapReadyCb.push({name:e,fn:function(){heap[e]&&heap[e].apply(heap,a)}})}},o=0;o<n.length;o++)heap[n[o]]=i(n[o])},heap.load("3712126961")</script>
Other Info
No links have been found while there are scripts, which is an indication that this is a modern web application.
URL https://synapp-expertise-dev-v2.synapp.eu/static/js
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/js
Method GET
Parameter
Attack
Evidence <script type="text/javascript">window.heapReadyCb=window.heapReadyCb||[],window.heap=window.heap||[],heap.load=function(e,a){window.heap.envId=e,window.heap.clientConfig=a=a||{},window.heap.clientConfig.shouldFetchServerConfig=!1;var r=document.createElement("script");r.type="text/javascript",r.async=!0,r.src="https://cdn.us.heap-api.com/config/"+e+"/heap_config.js";var t=document.getElementsByTagName("script")[0];t.parentNode.insertBefore(r,t);for(var n=["init","startTracking","stopTracking","track","resetIdentity","identify","getSessionId","getUserId","getIdentity","addUserProperties","addEventProperties","removeEventProperty","clearEventProperties","addAccountProperties","addAdapter","addTransformer","addTransformerFn","onReady","addPageviewProperties","removePageviewProperty","clearPageviewProperties","trackPageview"],i=function(e){return function(){var a=Array.prototype.slice.call(arguments,0);window.heapReadyCb.push({name:e,fn:function(){heap[e]&&heap[e].apply(heap,a)}})}},o=0;o<n.length;o++)heap[n[o]]=i(n[o])},heap.load("3712126961")</script>
Other Info
No links have been found while there are scripts, which is an indication that this is a modern web application.
Instances 5
Solution
This is an informational alert and so no changes are required.
Reference
CWE Id
WASC Id
Plugin Id 10109
Informational
Re-examine Cache-control Directives
Description
The cache-control header has not been set properly or is missing, allowing the browser and proxies to cache content. For static assets like css, js, or image files this might be intended, however, the resources should be reviewed to ensure that no sensitive content will be cached.
URL https://synapp-expertise-dev-v2.synapp.eu
Node Name https://synapp-expertise-dev-v2.synapp.eu
Method GET
Parameter cache-control
Attack
Evidence
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/manifest.json
Node Name https://synapp-expertise-dev-v2.synapp.eu/manifest.json
Method GET
Parameter cache-control
Attack
Evidence
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Node Name https://synapp-expertise-dev-v2.synapp.eu/robots.txt
Method GET
Parameter cache-control
Attack
Evidence
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/sitemap.xml
Node Name https://synapp-expertise-dev-v2.synapp.eu/sitemap.xml
Method GET
Parameter cache-control
Attack
Evidence
Other Info
URL https://synapp-expertise-dev-v2.synapp.eu/static/css
Node Name https://synapp-expertise-dev-v2.synapp.eu/static/css
Method GET
Parameter cache-control
Attack
Evidence
Other Info
Instances Systemic
Solution
For secure content, ensure the cache-control HTTP header is set with "no-cache, no-store, must-revalidate". If an asset should be cached consider setting the directives "public, max-age, immutable".
Reference https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html#web-content-caching
https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Cache-Control
https://grayduck.mn/2021/09/13/cache-control-recommendations/
CWE Id 525
WASC Id 13
Plugin Id 10015

Sequence Details

With the associated active scan results.