Apache Maven
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Apache Maven.
EOL Dates
Ensure that you are using a supported version of Apache Maven. Here are some end of life, and end of support dates for Apache Maven.
| Release | EOL Date | Status |
|---|---|---|
| 3.9 | - |
Active
|
| 3.8 | - |
Active
|
| 3.6 | March 30, 2021 |
EOL
Apache Maven 3.6 became EOL in 2021. |
| 3.5 | October 24, 2018 |
EOL
Apache Maven 3.5 became EOL in 2018. |
| 3.3 | April 3, 2017 |
EOL
Apache Maven 3.3 became EOL in 2017. |
| 3.2 | March 13, 2015 |
EOL
Apache Maven 3.2 became EOL in 2015. |
| 3.1 | February 14, 2014 |
EOL
Apache Maven 3.1 became EOL in 2014. |
| 3.0 | June 28, 2013 |
EOL
Apache Maven 3.0 became EOL in 2013. |
| 2 | February 18, 2014 |
EOL
Apache Maven 2 became EOL in 2014. |
| 1 | February 18, 2014 |
EOL
Apache Maven 1 became EOL in 2014. |
By the Year
In 2026 there have been 0 vulnerabilities in Apache Maven. Maven did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 0 | 0.00 |
| 2021 | 2 | 8.30 |
It may take a day or so for new Maven vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Apache Maven Security Vulnerabilities
jsoup is a Java library for working with HTML
CVE-2021-37714
7.5 - High
- August 18, 2021
jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.
Uncaught Exception
Apache Maven will follow repositories
CVE-2021-26291
9.1 - Critical
- April 23, 2021
Apache Maven will follow repositories that are defined in a dependencys Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
Origin Validation Error
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Apache Maven or by Apache? Click the Watch button to subscribe.