Written by Isaac Wuest, Principal Product Supervisor at HeroDevs.
When security groups take into consideration end-of-life (EOL) open supply software program, the dialog normally begins and ends in the identical place: no extra patches.
That is true, nevertheless it’s solely half the story, and arguably the much less harmful half. There are two compounding issues most groups are unaware of.
Drawback One: The CVE Ecosystem Does not Examine What It Does not Assist
When a vulnerability is found in an open supply venture, maintainers decide which variations are affected and file a CVE with an outlined affected vary. Each vulnerability scanner, SBOM device, and CVE feed within the trade consumes that vary.
In case your model falls outdoors it, you get no alert. Not since you’re protected, however as a result of nobody checked.
EOL variations fall outdoors that vary virtually by default. The reason being easy: it is a scale downside. In simply 5 years, the worldwide CVE rely doubled whereas the variety of unscored CVEs elevated 37x, in accordance with Sonatype’s 2026 State of the Software program Provide Chain report.
Maintainers are already overwhelmed investigating and patching the variations they actively assist, and as each CVE quantity and the entire variety of bundle releases proceed to develop, the investigative bandwidth required to cowl older launch traces merely does not exist.
Maintainers have to be practical about how far again in their very own launch historical past they will fairly go.
Sonatype’s analysis explicitly named “EOL variations omitted from advisories” as a driver of false security confidence, contributing to the 167,286 false negatives, exploitable elements that went fully unflagged, they recognized in 2025 alone.
HeroDevs’ EOL DS tracks end-of-life standing throughout 12M+ bundle variations on npm, PyPI, Maven, NuGet, and each different main registry.
Add an SBOM or run the CLI to seek out each EOL dependency in your stack, together with the transitive ones your scanners cannot flag.
Get Your Free EOL Danger Report
What This Seems to be Like in Follow
Two current essential vulnerabilities within the Spring ecosystem make this concrete.
CVE-2026-22732 — Spring Safety (Crucial, March 2026, CVSS 9.1)
This vulnerability causes security response headers, together with Cache-Management, X-Body-Choices, Strict-Transport-Safety, and Content material-Safety-Coverage, to be silently dropped in sure servlet utility configurations. The official affected vary covers Spring Safety 5.7.x by way of 7.0.x.
Spring Safety 6.2.x isn’t listed. It reached EOL in December 2025. Spring Boot 3.2 ships with Spring Safety 6.2. Any group working Boot 3.2, one minor model behind the listed vary, receives no scanner sign.
HeroDevs has confirmed Spring Safety 6.2.x is affected and has backported a repair for NES prospects. The upstream CVE file doesn’t mirror this.
How Typically Does This Occur?
The Spring examples above are usually not outliers. They mirror a sample HeroDevs encounters constantly throughout its By no means-Ending-Assist observe.
When a brand new CVE is disclosed on a supported bundle, HeroDevs finds it must patch an EOL model the official CVE file doesn’t record as affected roughly 80% of the time. The blast radius of any given vulnerability is systematically wider than what the file exhibits.
Put plainly: for 4 out of each 5 CVEs disclosed on a supported model, there’s a affordable chance that an EOL model you’re working can also be affected, and no scanner on this planet will let you know that.
Drawback Two: The Business Is Counting the Flawed EOL Software program
The CVE investigation hole above applies to EOL software program that the neighborhood truly is aware of is EOL. That seems to be a really small fraction of the actual downside.
Essentially the most broadly cited supply of EOL knowledge is endoflife.date, which tracks roughly 350 actively maintained tasks; main frameworks and runtimes the place maintainers have explicitly revealed end-of-life dates.
Throughout these 350 tasks, roughly 7,000 particular bundle variations are recognized as EOL. That’s the universe most scanners and security groups are working from.
Right here is the precise scale of the issue.
In Sonatype’s 2026 State of the Software program Provide Chain report, produced in partnership with HeroDevs, the information tells a unique story. Analyzing lifecycle standing throughout 12 million bundle variations spanning npm, PyPI, Maven, NuGet, RubyGems, Go, Packagist, and crates.io, HeroDevs discovered that 5.4 million of these variations are end-of-life.
Nonetheless, the trade’s most full public supply (endoflife.date) solely accounts for ~7,000 of them.
The breakdown by ecosystem is hanging. Roughly 25% of npm bundle variations are EOL. NuGet sits at round 18%, Cargo at 13%, PyPI at 11%, and Maven Central at 10%. These are variations actively showing in enterprise SBOMs at this time, with no CVE investigation protection and no repair path.
The Sonatype report discovered that 5–15% of elements in enterprise dependency graphs are EOL, indicating EOL publicity even when groups consider they’re solely utilizing supported top-level libraries. Transitive dependencies, the packages your packages depend upon, carry the vast majority of this hidden publicity.
Most organizations are profoundly underreporting their EOL publicity, and it isn’t their fault. Their tooling was by no means constructed to detect abandonment at scale.
HeroDevs has confirmed greater than 81,000 EOL bundle variations with identified CVEs and no obtainable repair path, which means these are CVEs that have been actively investigated and confirmed.
On condition that roughly 80% of CVEs on supported variations additionally have an effect on EOL variations that have been by no means formally investigated, the true quantity is probably going far bigger. HeroDevs estimates the precise determine could also be nearer to >400,000 throughout all registries.
Why This Is Getting Worse
This dynamic isn’t new. What’s new is the speed at which it’s compounding.
The OSS ecosystem is scaling sooner than the security infrastructure constructed to observe it. npm alone recorded over 838,000 releases related to essential CVSS 9.0+ scores in 2025. PyPI obtain quantity grew over 50% yr over yr.
Each new bundle model that enters a registry is a future EOL model, and the EOL inhabitants grows constantly, whereas the investigative capability to cowl it doesn’t.
The extra vital forcing operate, nevertheless, could also be AI.
In April 2026, Anthropic introduced Mission Glasswing alongside Claude Mythos Preview, documenting its capacity to establish and exploit zero-day vulnerabilities throughout all main working programs and browsers — together with vulnerabilities undetected for many years.
The initiative is explicitly defensive, directed towards discovering and fixing essential vulnerabilities earlier than attackers can exploit them.
For software program with lively assist, that is genuinely excellent news. Vulnerabilities discovered at AI scale might be routed to engineers who can deal with them.
For EOL software program, the calculus is totally different. An AI that finds vulnerabilities throughout the whole codebase panorama will floor findings in variations no maintainer is watching. These findings won’t be formally investigated in opposition to the EOL-affected ranges.
They won’t set off scanner alerts for EOL customers. No upstream patch will ever deal with them. The identical functionality that accelerates protection for supported software program widens the publicity hole for the whole lot already left behind.
The early indicators of this shift are already seen. The complete impression hasn’t arrived but.
What To Do
Begin with visibility. HeroDevs provides a free EOL scan.
Add dependency recordsdata or use the CLI to establish EOL publicity throughout your stack in minutes, masking each introduced and deserted packages throughout all main registries.
Do not deal with scanner silence as security. A clear scan in opposition to an EOL bundle means the bundle wasn’t checked, not that it’s not susceptible.
The Spring CVEs above are present proof — in each circumstances, EOL customers have been uncovered with out warning till HeroDevs investigated and reported.
EOL dates are usually not end traces. They’re the second threat silently transfers from maintainer to operator. As AI-assisted vulnerability analysis scales, the variety of undisclosed vulnerabilities in uninvestigated EOL packages will solely develop.
Get began at this time with HeroDev’s free EOL scan.
Sponsored and written by HeroDevs.



