Maven Apache Maven

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Apache Maven.

EOL Dates

Ensure that you are using a supported version of Apache Maven. Here are some end of life, and end of support dates for Apache Maven.

Release EOL Date Status
3.9 -
Active

3.8 -
Active

3.6 March 30, 2021
EOL

Apache Maven 3.6 became EOL in 2021.

3.5 October 24, 2018
EOL

Apache Maven 3.5 became EOL in 2018.

3.3 April 3, 2017
EOL

Apache Maven 3.3 became EOL in 2017.

3.2 March 13, 2015
EOL

Apache Maven 3.2 became EOL in 2015.

3.1 February 14, 2014
EOL

Apache Maven 3.1 became EOL in 2014.

3.0 June 28, 2013
EOL

Apache Maven 3.0 became EOL in 2013.

2 February 18, 2014
EOL

Apache Maven 2 became EOL in 2014.

1 February 18, 2014
EOL

Apache Maven 1 became EOL in 2014.

By the Year

In 2026 there have been 0 vulnerabilities in Apache Maven. Maven did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 2 8.30

It may take a day or so for new Maven vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Apache Maven Security Vulnerabilities

jsoup is a Java library for working with HTML
CVE-2021-37714 7.5 - High - August 18, 2021

jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.

Uncaught Exception

Apache Maven will follow repositories
CVE-2021-26291 9.1 - Critical - April 23, 2021

Apache Maven will follow repositories that are defined in a dependencys Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html

Origin Validation Error

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Apache Maven or by Apache? Click the Watch button to subscribe.

Apache
Vendor

Apache Maven
Product

subscribe