← Back to Baseline

Why it Matters

When a vulnerability is found in an installed extension, teams need a clear target version that contains the fix. Without a suggested fixed version, upgrades may stall or jump to risky major releases. That delay keeps the store exposed.

Providing the minimal patched version (and the safe version range) makes remediation fast and predictable. It also reduces regression risk by avoiding unnecessary major changes while still closing the security hole.

Verification Steps

Composer / Lockfile

# List installed packages and versions
composer show --installed

# Check a vulnerable package and find its fixed version
# (from OSV/GitHub advisory/vendor notes)
composer show vendor/extension -a

Policy check

# Confirm your internal advisory ticket includes:
# - Vulnerable version(s)
# - Minimal fixed version (e.g., >= 2.4.5)
# - Exact composer constraint to apply (e.g., ^2.4.5)

Remediation / Fix Guidance

  1. Identify the fixed version from OSV / vendor advisories (prefer the smallest safe bump).
  2. Pin composer to the fixed range and update:
    composer require vendor/extension:^2.4.5
    composer update vendor/extension
  3. Test checkout, login, cron, and any feature touched by the module.
  4. Deploy, clear caches, reindex, and monitor logs/metrics for regressions.
  5. Record the fix in your security change log with the exact version applied.

Examples

Fail Example
# Ticket says "update soon" but no target
# Result: upgrade delayed; vulnerable 2.4.3 stays in prod
Pass Example
# Ticket includes minimal fixed version and constraint
Affected: vendor/extension 2.4.0–2.4.4
Fixed in: 2.4.5
Action: composer require vendor/extension:^2.4.5

References