We release security patches for the latest stable version of the application.
Please update to the most recent release to ensure you receive the latest security fixes.
Version | Supported |
---|---|
Latest | ✅ |
Older | ❌ |
If you discover a security vulnerability, please do not create a public GitHub issue.
Instead, report it privately via one of the following methods:
- GitHub Security Advisories (preferred): Open a new draft advisory
- Email: [email protected]
When reporting, please include:
- A detailed description of the vulnerability.
- Steps to reproduce the issue.
- The potential impact (e.g., data loss, remote code execution).
- Suggested fixes (if available).
- Any relevant screenshots or proof-of-concept code.
- We will acknowledge receipt of your report within 3 working days.
- We will work on verifying and reproducing the vulnerability.
- We will aim to release a patch within 14 working days of verification (complex cases may take longer).
- Once fixed, we will publish a GitHub Security Advisory and, if applicable, request a CVE ID.
- We will credit the reporter publicly (unless you request otherwise).
We value responsible disclosure and will credit all verified security researchers in:
- The GitHub Security Advisory.
- This repository’s
SECURITY.md
acknowledgements section. - CVE records (if a CVE is issued).
We thank the following security researchers for their responsible disclosure and contributions:
- Adrian (@eternalvalhalla)
This section lists previously disclosed vulnerabilities, their impact, and who reported them.
Advisory ID / CVE | Description | Affected Versions | Patched Version | Reported By | Advisory Link |
---|---|---|---|---|---|
GHSA-3h8x-g9xj-rhwg |
Reflected XSS Vulnerability | < v4.4.0 |
v4.4.0 |
Adrian (@eternalvalhalla) | View |
GHSA-j457-9m86-6q5r |
Stored XSS vulnerability in Genealogy application | < v4.4.0 |
v4.4.0 |
Adrian (@eternalvalhalla) | View |