Supported Versions
The CoCart Headless Security Team believes in Responsible Disclosure by alerting the security team immediately and privately of any potential vulnerabilities. If a critical vulnerability is found in any of the current versions of a CoCart plugin, we may opt to backport any patches to previous versions.Core
Version | Supported |
---|---|
5.0.x | Yes |
4.6.x | Yes |
4.5.x | Yes |
4.4.x | Yes |
4.3.x | Yes |
4.2.x | No |
4.1.x | No |
4.0.x | No |
< 4.0.0 | No |
Plus
Version | Supported |
---|---|
2.0.x | Yes |
1.6.x | Yes |
1.5.x | Yes |
< 1.4.x | No |
JWT Authentication
Version | Supported |
---|---|
2.5.x | Yes |
2.4.x | Yes |
2.3.x | Yes |
2.2.x | Yes |
2.1.x | Yes |
2.0.x | Yes |
< 1.0.x | No |
Reporting a Vulnerability
For responsible disclosure of security issues, please submit your report based on instructions found on cocartapi.com/security-policy/. Our most critical targets are:- CoCart Core repository
- CoCart Plus
- CoCart JWT Authentication repository
- cocartapi.com — the primary marketplace and marketing site.
Guidelines
We’re committed to working with security researchers to resolve the vulnerabilities they discover. You can help us by following these guidelines:- Pen-testing Production:
- Please setup a local environment instead whenever possible. Most of our code is open source (see above).
- If that’s not possible, limit any data access/modification to the bare minimum necessary to reproduce a PoC.
- Don’t automate form submissions! That’s very annoying for us, because it adds extra work for the volunteers who manage those systems, and reduces the signal/noise ratio in our communication channels.
- Be Patient - Give us a reasonable time to correct the issue before you disclose the vulnerability.