{"id":94767,"date":"2026-03-26T09:00:00","date_gmt":"2026-03-26T16:00:00","guid":{"rendered":"https:\/\/github.blog\/?p=94767"},"modified":"2026-03-25T11:38:17","modified_gmt":"2026-03-25T18:38:17","slug":"a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware","status":"publish","type":"post","link":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/","title":{"rendered":"A year of open source vulnerability trends: CVEs, advisories, and malware"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>GitHub published 4,101 <a href=\"https:\/\/docs.github.com\/en\/code-security\/security-advisories\/working-with-global-security-advisories-from-the-github-advisory-database\/about-the-github-advisory-database#github-reviewed-advisories\">reviewed advisories<\/a> in 2025. This is the <strong>fewest number of reviewed advisories since 2021<\/strong>.&nbsp; Does this mean open source is shipping more secure code? Let&rsquo;s dig into the data to find out.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"h-github-reviewed-advisories\">GitHub reviewed advisories<\/h1>\n\n\n\n<p>Fewer advisories reviewed doesn&rsquo;t mean fewer vulnerabilities were reported. The drop is because GitHub reviewed far <strong>fewer older vulnerabilities<\/strong>. When you look only at newly reported vulnerabilities from <a href=\"https:\/\/docs.github.com\/en\/code-security\/security-advisories\/working-with-global-security-advisories-from-the-github-advisory-database\/about-the-github-advisory-database#about-the-github-advisory-database\">our sources<\/a>, GitHub actually reviewed <strong>19% more advisories<\/strong> year over year.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"4290\" height=\"2640\" loading=\"lazy\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?resize=4290%2C2640\" alt=\"Stacked bar graph showing the number of advisories published from GitHub's feeds and those published from the backfill campaigns.\n\nReviewed Year\tFrom Feeds\tFrom Backfill\n2020\t1145\t1539\n2021\t1419\t1412\n2022\t2731\t1848\n2023\t3065\t1792\n2024\t3142\t2093\n2025\t3734\t367\" class=\"wp-image-94769\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?w=4290 4290w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/1-GHADB-Feeds-vs-Backfill.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>So why the change? Quite frankly, we are running out of unreviewed vulnerabilities that are older than the <a href=\"https:\/\/docs.github.com\/en\/code-security\/concepts\/vulnerability-reporting-and-management\/about-the-github-advisory-database\">Advisory Database<\/a>. At the same time, the number of newly reported vulnerabilities hasn&rsquo;t dropped.<\/p>\n\n\n\n<aside data-color-mode=\"light\" data-dark-theme=\"dark\" data-light-theme=\"light_dimmed\" class=\"wp-block-group post-aside--large p-4 p-md-6 is-style-light-dimmed has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-light-dimmed--2\" style=\"border-top-width:4px\">\n<h2 class=\"wp-block-heading h5-mktg gh-aside-title is-typography-preset-h5\" id=\"h-what-is-the-github-advisory-database\" style=\"margin-top:0\">What is the GitHub Advisory Database?<\/h2>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/github.com\/advisories\">GitHub Advisory Database<\/a> provides a comprehensive list of known security vulnerabilities and malware affecting open source packages. It was created in 2019, and has since become a vital resource for open source developers.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.blog\/security\/github-advisory-database-by-the-numbers-known-security-vulnerabilities-and-what-you-can-do-about-them\/\">Read more in last year&rsquo;s blog post &gt;<\/a><\/p>\n<\/aside>\n\n\n\n<p>It&rsquo;s also worth clarifying that &ldquo;<a href=\"https:\/\/docs.github.com\/en\/code-security\/concepts\/vulnerability-reporting-and-management\/about-the-github-advisory-database#unreviewed-advisories\">unreviewed<\/a>&rdquo; in the database can be misleading: most advisories marked unreviewed have already been looked at by a curator and found not to affect any package in a <a href=\"https:\/\/docs.github.com\/en\/code-security\/security-advisories\/working-with-global-security-advisories-from-the-github-advisory-database\/about-the-github-advisory-database#github-reviewed-advisories\">supported ecosystem<\/a>, so they may never be fully reviewed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" height=\"631\" width=\"1024\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?resize=1024%2C631\" alt=\"Stacked line graph showing the cumulative number of advisories of each type over the years.\n\nYear\tUnreviewed\tReviewed\tMalware\tWithdrawn\n2019\t0\t381\t0\t42\n2020\t0\t3,065\t0\t101\n2021\t1,978\t5,896\t0\t140\n2022\t177,369\t10,475\t7,433\t195\n2023\t202,583\t15,332\t9,136\t290\n2024\t238,642\t20,567\t13,404\t413\n2025\t283,447\t24,668\t20,649\t522\" class=\"wp-image-94771\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?w=4299 4299w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/2-All-GHADB-Published.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>This means that you should be receiving fewer brand-new Dependabot alerts about old vulnerabilities.&nbsp;<\/p>\n\n\n\n<p><strong>Note<\/strong>: If you find an unreviewed advisory that affects a supported package, please <a href=\"https:\/\/docs.github.com\/en\/code-security\/security-advisories\/working-with-global-security-advisories-from-the-github-advisory-database\/editing-security-advisories-in-the-github-advisory-database\">let us know<\/a> so we can get it reviewed!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-vulnerabilities-were-distributed-across-ecosystems-in-2025\">How vulnerabilities were distributed across ecosystems in 2025<\/h2>\n\n\n\n<p>The distribution of ecosystems in advisories reviewed in 2025 is similar to the overall distribution in the database, with the exception of Go. Go is overrepresented in 2025 advisories by 6%. This is largely due to dedicated campaigns to re-examine potentially missing advisories found through an internal review for packages where we had inconsistent coverage.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"2236\" height=\"2649\" loading=\"lazy\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/3-Ecosystem-Distribution-2025.png?resize=2236%2C2649\" alt=\"Circle graph showing the distributions of ecosystems of advisories reviewed in 2025.\n\nEcosystem\tProportion of 2025 Reviewed Advisories\nComposer\t19.40%\nErlang\t0.22%\nGitHub Actions\t0.41%\nGo\t17.33%\nMaven\t22.24%\nnpm\t14.92%\nNuget\t2.33%\nPip\t17.16%\nRubyGems\t1.47%\nRust\t4.31%\nSwift\t0.22%\" class=\"wp-image-94772\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/3-Ecosystem-Distribution-2025.png?w=2236 2236w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/3-Ecosystem-Distribution-2025.png?w=253 253w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/3-Ecosystem-Distribution-2025.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/3-Ecosystem-Distribution-2025.png?w=864 864w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/3-Ecosystem-Distribution-2025.png?w=1297 1297w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/3-Ecosystem-Distribution-2025.png?w=1729 1729w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/3-Ecosystem-Distribution-2025.png?w=2000 2000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"2236\" height=\"2649\" loading=\"lazy\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/4-Ecosystem-Distribution-All.png?resize=2236%2C2649\" alt=\"Circle graph showing the distributions of ecosystems of reviewed advisories across the entire GitHub Advisory Database.\n\nEcosystem\tProportion of All Reviewed Advisories\nComposer\t20.16%\nErlang\t0.16%\nGitHub Actions\t0.15%\nGo\t10.91%\nMaven\t24.33%\nnpm\t17.05%\nNuget\t2.98%\nPip\t16.33%\nPub\t0.04%\nRubyGems\t3.60%\nRust\t4.13%\nSwift\t0.17%\" class=\"wp-image-94773\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/4-Ecosystem-Distribution-All.png?w=2236 2236w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/4-Ecosystem-Distribution-All.png?w=253 253w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/4-Ecosystem-Distribution-All.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/4-Ecosystem-Distribution-All.png?w=864 864w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/4-Ecosystem-Distribution-All.png?w=1297 1297w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/4-Ecosystem-Distribution-All.png?w=1729 1729w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/4-Ecosystem-Distribution-All.png?w=2000 2000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-the-types-of-vulnerabilities-changed-in-2025\">How the types of vulnerabilities changed in 2025<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Rank<\/strong><\/th><th><strong>Common Weakness Enumeration (CWE)<\/strong><\/th><th><strong>Number of 2025 Advisories*<\/strong><\/th><th><strong>Change in Rank from 2024<\/strong><\/th><th><strong>Change in Rank from the Overall Database<\/strong><\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>CWE-79<\/td><td>672<\/td><td>+0<\/td><td>+0<\/td><\/tr><tr><td>2<\/td><td>CWE-22<\/td><td>214<\/td><td>+2<\/td><td>+1<\/td><\/tr><tr><td>3<\/td><td>CWE-863<\/td><td>169<\/td><td>+9<\/td><td>+8<\/td><\/tr><tr><td>4<\/td><td>CWE-20<\/td><td>154<\/td><td>+1<\/td><td>+1<\/td><\/tr><tr><td>5<\/td><td>CWE-200<\/td><td>145<\/td><td>-2<\/td><td>-1<\/td><\/tr><tr><td>6<\/td><td>CWE-400<\/td><td>144<\/td><td>+4<\/td><td>+0<\/td><\/tr><tr><td>7<\/td><td>CWE-770<\/td><td>136<\/td><td>+7<\/td><td>+10<\/td><\/tr><tr><td>8<\/td><td>CWE-502<\/td><td>134<\/td><td>+5<\/td><td>+1<\/td><\/tr><tr><td>9<\/td><td>CWE-94<\/td><td>119<\/td><td>-3<\/td><td>-1<\/td><\/tr><tr><td>10<\/td><td>CWE-918<\/td><td>103<\/td><td>+5<\/td><td>+8<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><em>* An advisory may have more than CWE. For example, an advisory might have both CWE-400 and CWE-770. It would then count for both.<\/em><\/p>\n\n\n\n<p>As usual, cross-site scripting (CWE-79) is by far the most common vulnerability type. However, there are significant changes in the following areas. Resource exhaustion (CWE-400 and CWE-770), unsafe deserialization (CWE-502), and server-side request forgery (CWE-918) were unusually common in 2025. CWE-863 (&ldquo;Incorrect Authorization&rdquo;) saw a significant jump, but that is largely due to reclassification away from CWE-284 (&ldquo;Improper Access Control&rdquo;) and CWE-285 (&ldquo;Improper Authorization&rdquo;), which are higher level CWEs that the CWE program discourages using.<\/p>\n\n\n\n<p>One of the biggest quality improvements in 2025 was more specific, more consistent CWE tagging. <strong>Advisories without any CWE dropped 85%<\/strong> (from 452 in 2024 to 65 in 2025). CWE-20 (&ldquo;Improper Input Validation&rdquo;) is still common, but in prior years it was often the only CWE listed on an advisory.&nbsp;<\/p>\n\n\n\n<p>In 2025, advisories far more often list CWE-20 plus one or more additional CWEs that describe the concrete failure mode. This added specificity makes the data more actionable for triage, prioritization, and remediation.<\/p>\n\n\n\n<p>To find out how to filter Dependabot alerts by CWE, see our <a href=\"https:\/\/docs.github.com\/en\/code-security\/how-tos\/secure-your-supply-chain\/manage-your-dependency-security\/customizing-auto-triage-rules-to-prioritize-dependabot-alerts\">documentation on auto-triage rules<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-prioritize-your-response\">How to prioritize your response<\/h2>\n\n\n\n<p>We provide two scoring systems for prioritization:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.first.org\/cvss\/\">Common Vulnerability Severity Score (CVSS)<\/a>: Scores how severe the impact of the vulnerability will be<\/li>\n\n\n\n<li><a href=\"https:\/\/www.first.org\/epss\/\">Exploit Prediction Scoring System (EPSS)<\/a>: Provides a measure of how likely the vulnerability will be attacked in the next 30 days and&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Together, they can give you a head start on your risk assessment process.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" height=\"630\" width=\"1024\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?resize=1024%2C630\" alt=\"Priority\tCVSS\tEPSS\nCritical\t392\t11\nHigh\t1237\t96\nModerate\t1994\t221\nLow\t475\t1517\nVery Low\t\t1872\" class=\"wp-image-94774\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?w=4290 4290w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/5-2025-Scoring-Systems.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>As you can see, when considering impact, most vulnerabilities skew moderate to high of the impact range. Low-impact vulnerabilities are likely more common than the CVSS data suggests but are often not considered worth the time and effort for researchers and maintainers to report. The EPSS scores for moderate to high impact vulnerabilities support this decision.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" height=\"632\" width=\"1024\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?resize=1024%2C632\" alt=\"Priority\tCVSS\tEPSS\nCritical\t8\t4\nHigh\t8\t11\nModerate\t2\t3\nLow\t0\t0\nVery Low\t0\t0\" class=\"wp-image-94775\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=4290 4290w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=288 288w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/6-KEV-Scoring-Comparison.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>So should you trust the EPSS or CVSS scores? To judge that, let&rsquo;s look at how they match up to vulnerabilities in <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">CISA&rsquo;s Known Exploited Vulnerabilities Catalog<\/a>. The <strong>exploited vulnerabilities are at least scored moderate,<\/strong> and most are critical or high. While CVSS has more of the exploited vulnerabilities as critical, it also has far more vulnerabilities in the range in general. Combining the two can help you prioritize which vulnerabilities to address to prevent exploitation.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"npm-malware-advisories\">npm malware advisories<\/h1>\n\n\n\n<p>2025 was a huge year for npm malware advisories. Due to large malware campaigns, such as <a href=\"https:\/\/github.blog\/security\/supply-chain-security\/strengthening-supply-chain-security-preparing-for-the-next-malware-campaign\/\">SHA1-Hulud<\/a>, GitHub saw a <strong>69% increase in published malware advisories<\/strong> compared to 2024. This is the most malware advisories GitHub has published since our initial release of historical malware when we added support in <a href=\"https:\/\/github.blog\/changelog\/2022-06-15-advisory-database-supports-malware-advisories\/\">2022<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.blog\/changelog\/2026-03-17-dependabot-now-detects-malware-in-npm-dependencies\/\">You can receive Dependabot alerts<\/a> when your repositories depend on npm packages with known malicious versions. When you enable malware alerting, Dependabot matches your npm dependencies against malware advisories in the GitHub Advisory Database.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" height=\"631\" width=\"1024\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?resize=1024%2C631\" alt=\"Bar graph showing the number of published malware advisories each year.\n\nPublication Year\tPublished Malware Advisories\n2022\t7433\n2023\t1703\n2024\t4268\n2025\t7197\" class=\"wp-image-94776\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?w=4299 4299w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/7-Malware-Advisories.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"github-cve-numbering-authority-cna\">GitHub CVE Numbering Authority (CNA)<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cve-publications\">CVE publications<\/h2>\n\n\n\n<p>2025 was a big year for the <a href=\"https:\/\/www.cve.org\/PartnerInformation\/ListofPartners\/partner\/GitHub_M\">GitHub, Inc. CNA<\/a>. We saw a <strong>35% increase in published CVE records<\/strong>, outpacing the overall CVE Project&rsquo;s increase of 21%.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" height=\"631\" width=\"1024\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?resize=1024%2C631\" alt=\"Bar graph showing the number of CVEs GitHub published year.\n\nPublished Year\tCVEs Published in 2025\n2020\t509\n2021\t1047\n2022\t1297\n2023\t1784\n2024\t2152\n2025\t2903\" class=\"wp-image-94777\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?w=4299 4299w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/8-2025-Published-CVEs.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>In fact, we saw 10 to 16% growth every quarter. If this trend continues, GitHub will publish over 50% more CVEs in 2026.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" height=\"631\" width=\"1024\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?resize=1024%2C631\" alt=\"Bar graph showing the number of CVEs published by GitHub each quarter in 2025.\n\n2025 Published Quarter\tNumber of CVEs\nQ1\t598\nQ2\t660\nQ3\t762\nQ4\t883\" class=\"wp-image-94778\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?w=4299 4299w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/9-2025-Published-CVEs-Quarterly.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>You can help make that a reality by <a href=\"https:\/\/docs.github.com\/en\/code-security\/security-advisories\/working-with-repository-security-advisories\/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional\">requesting a CVE<\/a> from us the next time you publish a repository security advisory about a vulnerability!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"organizations-using-githubs-cna\">Organizations using GitHub&rsquo;s CNA<\/h2>\n\n\n\n<p>Every year, GitHub sees more organizations use its CNA services. 2025 is no exception with a <strong>20% increase in new organizations requesting CVE IDs<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" height=\"632\" width=\"1024\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?resize=1024%2C632\" alt=\"Bar graph showing the number of new organizations using GitHub for CVEs for each year.\n\nFirst CVE Year\tNew Organizations Using GitHub for CVEs\n2020\t231\n2021\t303\n2022\t328\n2023\t444\n2024\t568\n2025\t679\" class=\"wp-image-94779\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=4290 4290w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=288 288w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/10-New-CVE-Requesters.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>Unlike <a href=\"https:\/\/docs.github.com\/en\/code-security\/concepts\/vulnerability-reporting-and-management\/about-the-github-advisory-database#github-reviewed-advisories\">reviewed<\/a> global advisories, which are always mapped to packages in ecosystems we support, <strong>any maintainer on GitHub can request a CVE<\/strong>, even if they don&rsquo;t publish that package to a supported ecosystem. In fact, 2025 is the first year that GitHub has published more CVEs from organizations that do not use a supported ecosystem than those that do.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" height=\"630\" width=\"1024\" src=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?resize=1024%2C630\" alt=\"Stacked bar graph showing the number of CVEs GitHub published for vulnerabilities affected supported packages vs CVEs that don&rsquo;t.\n\nPublished Year\tDoes Not Affect an Advisory DB Supported Ecosystem\tAffects Advisory DB Supported Ecosystem\n2020\t203\t306\n2021\t382\t665\n2022\t491\t806\n2023\t827\t957\n2024\t961\t1191\n2025\t1480\t1423\" class=\"wp-image-94780\" srcset=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?w=4290 4290w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?w=300 300w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?w=768 768w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?w=1024 1024w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?w=1536 1536w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?w=2048 2048w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?w=1416 1416w, https:\/\/github.blog\/wp-content\/uploads\/2026\/03\/11-CVE-Supported-Ecosystem-Comparison.png?w=3000 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>We would like to <strong>thank all 987 organizations<\/strong> that published CVEs with us in 2025 and highlight the top 10 most prolific organizations.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th colspan=\"2\">Top 10 organizations using the GitHub CNA<\/th><\/tr><\/thead><tbody><tr><td><strong>Organization<\/strong><\/td><td><strong>Number of 2025 CVEs<\/strong><\/td><\/tr><tr><td>LabReDeS (WeGIA)*<\/td><td>130<\/td><\/tr><tr><td>XWiki<\/td><td>40<\/td><\/tr><tr><td>Frappe<\/td><td>28<\/td><\/tr><tr><td>Discourse<\/td><td>27<\/td><\/tr><tr><td>Enalean<\/td><td>27<\/td><\/tr><tr><td>FreeScout*<\/td><td>27<\/td><\/tr><tr><td>DataEase<\/td><td>26<\/td><\/tr><tr><td>Nextcloud<\/td><td>25<\/td><\/tr><tr><td>GLPI<\/td><td>24<\/td><\/tr><tr><td>DNN Software*<\/td><td>23<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><em>* Organizations that published CVEs through GitHub for the first time in 2025<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"onward-to-2026\">Onward to 2026<\/h1>\n\n\n\n<p>The data from 2025 shows incredible growth:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>4,101 reviewed advisories&nbsp;<\/strong><\/li>\n\n\n\n<li><strong>7,197 malware advisories&nbsp;<\/strong><\/li>\n\n\n\n<li><strong>2,903 CVEs published<\/strong><\/li>\n\n\n\n<li><strong>679 new organizations using our CNA services<\/strong>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These numbers represent real security improvements for millions of developers.<\/p>\n\n\n\n<p>You can be part of this in 2026. Here&rsquo;s how:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1-use-our-cna-services\">1. Use our CNA services<\/h3>\n\n\n\n<p>Publishing CVEs shouldn&rsquo;t be complicated. <a href=\"https:\/\/docs.github.com\/en\/code-security\/security-advisories\/working-with-repository-security-advisories\/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional\">Request a CVE<\/a> directly from your repository security advisory, and we&rsquo;ll take care of curating and publishing it for you. It&rsquo;s free, it&rsquo;s fast, and it helps the entire ecosystem understand and respond to vulnerabilities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-improve-advisory-accuracy\">2. Improve advisory accuracy<\/h3>\n\n\n\n<p>Found an unreviewed advisory affecting a supported package? See incorrect severity scores or missing affected versions? <a href=\"https:\/\/docs.github.com\/en\/code-security\/security-advisories\/working-with-global-security-advisories-from-the-github-advisory-database\/editing-security-advisories-in-the-github-advisory-database\">Suggest edits<\/a>. Your edits will be reviewed by the Advisory Database team and ultimately, will help make the database more accurate for everyone. In 2025, <strong>675 contributions from the community<\/strong> improved the quality of this data for the entire software industry!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-protect-your-projects\">3. Protect your projects<\/h3>\n\n\n\n<p>The most direct impact you can have is protecting your own code. <a href=\"https:\/\/docs.github.com\/en\/code-security\/dependabot\/dependabot-security-updates\/configuring-dependabot-security-updates\">Enable Dependabot<\/a> to automatically receive security updates and explore <a href=\"https:\/\/docs.github.com\/en\/get-started\/learning-about-github\/about-github-advanced-security\">GitHub Advanced Security<\/a> for comprehensive protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"4-make-reporting-a-vulnerability-easier\">4. Make reporting a vulnerability easier<\/h3>\n\n\n\n<p>Let researchers know how to report to you and what you will and will not accept by <a href=\"https:\/\/docs.github.com\/en\/code-security\/how-tos\/report-and-fix-vulnerabilities\/configure-vulnerability-reporting\/adding-a-security-policy-to-your-repository\">creating a security policy<\/a> for your repository. <a href=\"https:\/\/docs.github.com\/en\/code-security\/how-tos\/report-and-fix-vulnerabilities\/configure-vulnerability-reporting\/configuring-private-vulnerability-reporting-for-a-repository\">Enable private vulnerability reporting<\/a> to make the coordination process smooth and secure.<\/p>\n\n\n\n<p>Let&rsquo;s make 2026 even better. See you in next year&rsquo;s review! &#128640;<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew\u2014here\u2019s what changed and what it means for your triage and response. <\/p>\n","protected":false},"author":2339,"featured_media":93179,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_gh_post_show_toc":"yes","_gh_post_is_no_robots":"","_gh_post_is_featured":"yes","_gh_post_is_excluded":"","_gh_post_is_unlisted":"","_gh_post_related_link_1":"","_gh_post_related_link_2":"","_gh_post_related_link_3":"","_gh_post_sq_img":"","_gh_post_sq_img_id":"","_gh_post_cta_title":"","_gh_post_cta_text":"","_gh_post_cta_link":"","_gh_post_cta_button":"","_gh_post_recirc_hide":"","_gh_post_recirc_col_1":"","_gh_post_recirc_col_2":"","_gh_post_recirc_col_3":"","_gh_post_recirc_col_4":"","_featured_video":"","_gh_post_additional_query_params":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"_links_to":"","_links_to_target":""},"categories":[91,3335],"tags":[3465,3705,3704,145,3703,1915,3828,3529],"coauthors":[3701],"class_list":["post-94767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-supply-chain-security","tag-cve","tag-cvss","tag-cwe","tag-dependabot","tag-epss","tag-github-security-lab","tag-malware","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A year of open source vulnerability trends: CVEs, advisories, and malware - The GitHub Blog<\/title>\n<meta name=\"description\" content=\"Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew\u2014here\u2019s what changed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A year of open source vulnerability trends: CVEs, advisories, and malware\" \/>\n<meta property=\"og:description\" content=\"Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew\u2014here\u2019s what changed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The GitHub Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/github.blog\/wp-content\/uploads\/2026\/01\/github-generic-security-blocks-logo.png?fit=1920%2C1080\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jonathan Evans\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan Evans\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/\"},\"author\":{\"name\":\"Jonathan Evans\",\"@id\":\"https:\\\/\\\/github.blog\\\/#\\\/schema\\\/person\\\/6398b27ea80f0db97a6e23daa8d1d7a1\"},\"headline\":\"A year of open source vulnerability trends: CVEs, advisories, and malware\",\"datePublished\":\"2026-03-26T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/\"},\"wordCount\":1269,\"image\":{\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/github.blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/github-generic-security-blocks-logo.png?fit=1920%2C1080\",\"keywords\":[\"CVE\",\"CVSS\",\"CWE\",\"Dependabot\",\"EPSS\",\"GitHub Security Lab\",\"malware\",\"vulnerability\"],\"articleSection\":[\"Security\",\"Supply chain security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/\",\"url\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/\",\"name\":\"A year of open source vulnerability trends: CVEs, advisories, and malware - The GitHub Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/github.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/github.blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/github-generic-security-blocks-logo.png?fit=1920%2C1080\",\"datePublished\":\"2026-03-26T16:00:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/github.blog\\\/#\\\/schema\\\/person\\\/6398b27ea80f0db97a6e23daa8d1d7a1\"},\"description\":\"Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew\u2014here\u2019s what changed.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/github.blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/github-generic-security-blocks-logo.png?fit=1920%2C1080\",\"contentUrl\":\"https:\\\/\\\/github.blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/github-generic-security-blocks-logo.png?fit=1920%2C1080\",\"width\":1920,\"height\":1080,\"caption\":\"A shield with a checkmark icon appears centered among decorative green blocks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/github.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/github.blog\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Supply chain security\",\"item\":\"https:\\\/\\\/github.blog\\\/security\\\/supply-chain-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"A year of open source vulnerability trends: CVEs, advisories, and malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/github.blog\\\/#website\",\"url\":\"https:\\\/\\\/github.blog\\\/\",\"name\":\"The GitHub Blog\",\"description\":\"Updates, ideas, and inspiration from GitHub to help developers build and design software.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/github.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/github.blog\\\/#\\\/schema\\\/person\\\/6398b27ea80f0db97a6e23daa8d1d7a1\",\"name\":\"Jonathan Evans\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/699e0820155a4e87bea4bfdc033438361e2bbb042a4fb8f3319ccd534dc4c7f2?s=96&d=mm&r=g885db78773df7bb3fba1167d8e54b35d\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/699e0820155a4e87bea4bfdc033438361e2bbb042a4fb8f3319ccd534dc4c7f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/699e0820155a4e87bea4bfdc033438361e2bbb042a4fb8f3319ccd534dc4c7f2?s=96&d=mm&r=g\",\"caption\":\"Jonathan Evans\"},\"description\":\"Security Analyst, curator of the GitHub Advisory Database, and one of the members of the Security Lab responsible for issuing CVE IDs and publishing CVE records.\",\"url\":\"https:\\\/\\\/github.blog\\\/author\\\/jonathanlevans\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A year of open source vulnerability trends: CVEs, advisories, and malware - The GitHub Blog","description":"Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew\u2014here\u2019s what changed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/","og_locale":"en_US","og_type":"article","og_title":"A year of open source vulnerability trends: CVEs, advisories, and malware","og_description":"Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew\u2014here\u2019s what changed.","og_url":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/","og_site_name":"The GitHub Blog","article_published_time":"2026-03-26T16:00:00+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/github.blog\/wp-content\/uploads\/2026\/01\/github-generic-security-blocks-logo.png?fit=1920%2C1080","type":"image\/png"}],"author":"Jonathan Evans","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jonathan Evans","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/#article","isPartOf":{"@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/"},"author":{"name":"Jonathan Evans","@id":"https:\/\/github.blog\/#\/schema\/person\/6398b27ea80f0db97a6e23daa8d1d7a1"},"headline":"A year of open source vulnerability trends: CVEs, advisories, and malware","datePublished":"2026-03-26T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/"},"wordCount":1269,"image":{"@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/github.blog\/wp-content\/uploads\/2026\/01\/github-generic-security-blocks-logo.png?fit=1920%2C1080","keywords":["CVE","CVSS","CWE","Dependabot","EPSS","GitHub Security Lab","malware","vulnerability"],"articleSection":["Security","Supply chain security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/","url":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/","name":"A year of open source vulnerability trends: CVEs, advisories, and malware - The GitHub Blog","isPartOf":{"@id":"https:\/\/github.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/#primaryimage"},"image":{"@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/github.blog\/wp-content\/uploads\/2026\/01\/github-generic-security-blocks-logo.png?fit=1920%2C1080","datePublished":"2026-03-26T16:00:00+00:00","author":{"@id":"https:\/\/github.blog\/#\/schema\/person\/6398b27ea80f0db97a6e23daa8d1d7a1"},"description":"Reviewed advisories hit a four-year low, malware advisories surged, and CNA publishing grew\u2014here\u2019s what changed.","breadcrumb":{"@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/#primaryimage","url":"https:\/\/github.blog\/wp-content\/uploads\/2026\/01\/github-generic-security-blocks-logo.png?fit=1920%2C1080","contentUrl":"https:\/\/github.blog\/wp-content\/uploads\/2026\/01\/github-generic-security-blocks-logo.png?fit=1920%2C1080","width":1920,"height":1080,"caption":"A shield with a checkmark icon appears centered among decorative green blocks."},{"@type":"BreadcrumbList","@id":"https:\/\/github.blog\/security\/supply-chain-security\/a-year-of-open-source-vulnerability-trends-cves-advisories-and-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/github.blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/github.blog\/security\/"},{"@type":"ListItem","position":3,"name":"Supply chain security","item":"https:\/\/github.blog\/security\/supply-chain-security\/"},{"@type":"ListItem","position":4,"name":"A year of open source vulnerability trends: CVEs, advisories, and malware"}]},{"@type":"WebSite","@id":"https:\/\/github.blog\/#website","url":"https:\/\/github.blog\/","name":"The GitHub Blog","description":"Updates, ideas, and inspiration from GitHub to help developers build and design software.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/github.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/github.blog\/#\/schema\/person\/6398b27ea80f0db97a6e23daa8d1d7a1","name":"Jonathan Evans","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/699e0820155a4e87bea4bfdc033438361e2bbb042a4fb8f3319ccd534dc4c7f2?s=96&d=mm&r=g885db78773df7bb3fba1167d8e54b35d","url":"https:\/\/secure.gravatar.com\/avatar\/699e0820155a4e87bea4bfdc033438361e2bbb042a4fb8f3319ccd534dc4c7f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/699e0820155a4e87bea4bfdc033438361e2bbb042a4fb8f3319ccd534dc4c7f2?s=96&d=mm&r=g","caption":"Jonathan Evans"},"description":"Security Analyst, curator of the GitHub Advisory Database, and one of the members of the Security Lab responsible for issuing CVE IDs and publishing CVE records.","url":"https:\/\/github.blog\/author\/jonathanlevans\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/github.blog\/wp-content\/uploads\/2026\/01\/github-generic-security-blocks-logo.png?fit=1920%2C1080","jetpack_shortlink":"https:\/\/wp.me\/pamS32-oEv","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/posts\/94767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/users\/2339"}],"replies":[{"embeddable":true,"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/comments?post=94767"}],"version-history":[{"count":7,"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/posts\/94767\/revisions"}],"predecessor-version":[{"id":94807,"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/posts\/94767\/revisions\/94807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/media\/93179"}],"wp:attachment":[{"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/media?parent=94767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/categories?post=94767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/tags?post=94767"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/github.blog\/wp-json\/wp\/v2\/coauthors?post=94767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}