When a vulnerability is found in an installed extension, teams need a clear target version that contains the fix. Without a suggested fixed version, upgrades may stall or jump to risky major releases. That delay keeps the store exposed.
Providing the minimal patched version (and the safe version range) makes remediation fast and predictable. It also reduces regression risk by avoiding unnecessary major changes while still closing the security hole.
# List installed packages and versions
composer show --installed
# Check a vulnerable package and find its fixed version
# (from OSV/GitHub advisory/vendor notes)
composer show vendor/extension -a
# Confirm your internal advisory ticket includes:
# - Vulnerable version(s)
# - Minimal fixed version (e.g., >= 2.4.5)
# - Exact composer constraint to apply (e.g., ^2.4.5)
composer require vendor/extension:^2.4.5
composer update vendor/extension
# Ticket says "update soon" but no target
# Result: upgrade delayed; vulnerable 2.4.3 stays in prod
# Ticket includes minimal fixed version and constraint
Affected: vendor/extension 2.4.0–2.4.4
Fixed in: 2.4.5
Action: composer require vendor/extension:^2.4.5