|
4 | 4 |
|
5 | 5 | ## Supported Versions |
6 | 6 |
|
7 | | -EPPlus 7 and 8 are automatically scanned for vulnerabilities and static code analysis is performed as part of the CI. |
| 7 | +See [Supported Versions](https://epplussoftware.com/en/Security/SupportedVersions) on the EPPlus website. |
8 | 8 |
|
9 | | -|Version|Supported|Comment|Deprecation date| |
10 | | -|-|-|-|-| |
11 | | -|8.x.x|:white\_check\_mark:||| |
12 | | -|7.x.x|:white\_check\_mark:||| |
13 | | -|6.x.x|:x:|Deprecated/unsupported versions|2025-12-31| |
14 | | -|5.x.x|:x:|Deprecated/unsupported versions|2024-12-31| |
15 | | -|< 4.5|:x:|Deprecated/unsupported versions|2020-12-31| |
| 9 | +## Security Update Policy |
16 | 10 |
|
17 | | -## Security update policy |
18 | | - |
19 | | -Security patches will be provided via new revisions released in our public Nuget feed. One patch for each supported major version/the two latest minor versions will be provided. [Subscribe to our newsletter](https://epplussoftware.com/en/Home/Newsletter) to get updates from EPPlus Software. |
| 11 | +Security patches will be provided via new revisions released in our public NuGet feed. One patch for each supported major version/the two latest minor versions will be provided. [Subscribe to our newsletter](https://epplussoftware.com/en/Home/Newsletter) to get updates from EPPlus Software. |
20 | 12 |
|
21 | 13 | ## Reporting a Vulnerability |
22 | 14 |
|
23 | | -If you discover a security vulnerability in EPPlus, please report it through GitHub's private vulnerability reporting: |
24 | | - |
25 | | -1. Go to the [Security tab](https://github.com/EPPlusSoftware/EPPlus/security/advisories/new) on the EPPlus repository. |
26 | | -2. Click "Report a vulnerability" and fill in the details. |
27 | | - |
28 | | -This ensures the report stays private until we have assessed and addressed the issue. Please do not report security vulnerabilities through the public issue tracker. |
| 15 | +See our [Vulnerability Disclosure Policy](https://epplussoftware.com/en/Security/VulnerabilityDisclosurePolicy) for instructions on how to report a vulnerability, what to expect, and our safe harbor commitment. |
29 | 16 |
|
30 | | -## Code signing |
| 17 | +Please do not report security vulnerabilities through the public issue tracker or other public channels. |
31 | 18 |
|
32 | | -Since version 7.5 the EPPlus Nuget package and the EPPlus libraries/dll:s are digitally signed by EPPlus Software AB. |
| 19 | +## Code Signing |
33 | 20 |
|
34 | | -## See also |
35 | | - |
36 | | -* [EPPlus versioning](https://github.com/EPPlusSoftware/EPPlus/wiki/Releases-versioning) |
| 21 | +Since version 7.5 the EPPlus NuGet package and the EPPlus libraries/DLLs are digitally signed by EPPlus Software AB. |
37 | 22 |
|
38 | 23 | ## Vulnerabilities |
39 | 24 |
|
40 | | -|Detected|Resolved|Affected EPPlus versions|CVE|Our comment|Resolution| |
41 | | -|-|-|-|-|-|-| |
42 | | -|April 15, 2026|April 16, 2026|EPPlus 8.x,targeting .NET 9 or 10|[Microsoft Security Advisory - CVE-2026-33116](https://github.com/advisories/GHSA-37gx-xxp4-5rgx) and [Microsoft Security Advisory - CVE-2026-26171](https://github.com/advisories/GHSA-w3x6-4m5h-cxqf)|Microsoft has released a security fix in System.Security.Cryptography.Xml 10.0.6 and 9.0.15. EPPlus uses this package to create and validate digital signatures for workbooks. The potential risk for most users should be very low.|Patch released in version 8.5.3| |
43 | | -|October 10, 2024|October 11, 2024|EPPlus 7.x,targeting .NET 7 or 8|[Microsoft Security Advisory CVE-2024-38095](https://github.com/advisories/GHSA-447r-wph3-92pm) and [Microsoft Security Advisory CVE-2024-30105](https://github.com/advisories/GHSA-hh2w-p6rv-4g7w)|Microsoft has released a security fix in Microsoft.Extensions.Configuration.Json 8.0.1. The potential risk for most users should be low.|Patch released in version 7.4.1| |
44 | | -|September 9, 2024||EPPlus 7.x, targeting .NET 7 or 8|[Microsoft Security Advisory CVE-2024-38095](https://github.com/advisories/GHSA-447r-wph3-92pm) and [Microsoft Security Advisory CVE-2024-30105](https://github.com/advisories/GHSA-hh2w-p6rv-4g7w)|Microsoft has released security fixes for System.Text.Json and System.Formats.Asn1 (transient dependencies in EPPlus). The potential risk for most users should be low.|Patch released in version 7.3.2| |
45 | | -|June 15, 2023|June 15, 2023|EPPlus 6.x prior to 6.2.6, targeting .NET 6 or 7.|[.NET Denial of Service vulnerability (CVE 2023-29331)](https://github.com/advisories/GHSA-555c-2p6r-68mm)|Microsoft has released a security fix for a Denial of Service vulnerability (CVE-2023-29331) in System.Security.Cryptography.Pkcs for .NET 6 and .NET 7. EPPlus uses this component for x509 certificates used when signing VBA projects in a workbook. The potential risk for most users should be low, as the certificates used to sign your workbooks are usually known.|Upgrade to EPPlus 6.2.6 or higher| |
| 25 | +All known vulnerabilities, assessments, and advisories are published on our [Vulnerability Disclosures](https://epplussoftware.com/en/Security/Vulnerabilities) page. |
| 26 | + |
| 27 | +## Security Transparency |
46 | 28 |
|
| 29 | +We publish detailed security information including vulnerability disclosures, automated scan results, and software bills of materials on our [Security overview](https://epplussoftware.com/en/Security). |
47 | 30 |
|
| 31 | +## See Also |
48 | 32 |
|
| 33 | +- [EPPlus versioning](https://github.com/EPPlusSoftware/EPPlus/wiki/Releases-versioning) |
0 commit comments