I just read the Sonatype 2026 Software Supply Chain Report, and one number jumped out at me: 81,000+ package versions with known CVEs are end-of-life and unpatchable. HeroDevs estimates the real number across all registries might be 400,000.
Let me repeat that: Nearly half a million vulnerable software packages that will never be patched.
And the kicker? 5-15% of enterprise dependency graphs contain these EOL packages. That means YOUR production systems probably depend on software with known, exploitable vulnerabilities that will never be fixed.
Welcome to the future of open source security. It’s worse than you think.
Why This Is Different From Normal Vulnerabilities
Normal vulnerability: CVE published, maintainer patches it, you upgrade, problem solved.
EOL vulnerability: CVE published, no maintainer to patch it, your options are:
- Live with the vulnerability (hope nobody exploits it)
- Fork and patch yourself (expensive, ongoing burden)
- Pay for extended support (if available, often expensive)
- Rewrite your application (months of work, business might say no)
Every option is costly. Every option could have been avoided with better OSS sustainability.
A Real Example From My Work
I consult with fintech startups in Africa. One client uses Node 12 in production. Node 12 went EOL in April 2022. That’s almost 4 years running unsupported, vulnerable software.
Why haven’t they upgraded?
- Their app depends on 47 packages
- 12 of those packages don’t work on Node 16+
- Updating those 12 packages requires rewriting core business logic
- Cost estimate: 6 months, 3 engineers, $300K
- Business priority: “We’ll get to it next quarter” (for 4 years running)
Meanwhile, they’re sitting on Node 12 with 23 known CVEs, 8 rated critical. They know this. Their security team knows this. But the cost to fix it keeps getting deferred.
The Math Doesn’t Work
Here’s the impossible equation enterprises face:
Option A - Accept Risk
- Cost: $0 immediate
- Risk: Data breach ($5M+ average cost)
- Probability: Unknown but increasing
- Regulatory: Non-compliant (fail audits)
Option B - Upgrade/Rewrite
- Cost: $500K - $5M depending on scope
- Timeline: 6-18 months
- Business disruption: Significant
- Opportunity cost: Can’t ship new features
Option C - Extended Support
- Cost: $100-300K/year
- Availability: Limited to certain projects
- Coverage: Not all dependencies
- Long-term: Vendor dependency
None of these options are good. All are expensive. All result from the same root cause: We built on OSS that we didn’t support, and now it’s our problem.
The Scale of the Problem
Sonatype’s numbers are staggering:
- 81,000+ unpatchable package versions (known floor)
- 5-15% of enterprise dependencies are EOL
- Growing faster than we can remediate
Let’s do the math:
- If you have 500 dependencies (typical medium enterprise)
- 5% are EOL = 25 vulnerable packages you can’t patch
- Each requires individual assessment and remediation strategy
- At 40 hours per package (conservative) = 1,000 engineering hours
- At $150/hour loaded cost = $150K just to understand your exposure
And that’s before you fix anything.
Why This Will Get Worse
Remember the earlier discussions about maintainer burnout? 60% considering quitting?
Every maintainer who quits is another project going EOL. Every EOL project is more unpatchable vulnerabilities.
We’re in a death spiral:
- Maintainers burn out because companies don’t fund OSS
- Projects go EOL
- Companies face massive remediation costs
- Companies still don’t fund OSS (they pay remediation instead)
- More maintainers burn out (seeing their work become liability)
The remediation industry (HeroDevs, Tidelift, etc.) is growing because we’re failing at prevention. We’re creating a problem, then paying more to solve it than prevention would have cost.
What Companies Are Actually Doing
I see three patterns in the wild:
Pattern 1 - Denial
“It hasn’t been exploited yet, so we’re fine.”
This is gambling, not risk management. Eventually, your number comes up.
Pattern 2 - Whack-a-Mole
Upgrade when specific CVEs get too scary, ignore the rest.
This is reactive, expensive, and never gets ahead of the problem.
Pattern 3 - Extended Support Vendors
Pay HeroDevs, Tidelift, or similar for EOL support.
This works but is expensive and shifts risk rather than solving it.
What I almost never see: Proactive OSS funding to prevent projects from going EOL in the first place.
The Economics Are Insane
A typical company might:
- Use 500 OSS dependencies saving $50M+ in licensing costs
- Spend $0 supporting those dependencies
- Face $5M+ in remediation when things go EOL
- Pay $200K/year for extended support vendors
- Still have unfixable vulnerabilities in production
Meanwhile, if they’d spent $500K/year supporting critical dependencies (the model Keisha shared earlier), most of those projects wouldn’t have gone EOL.
We’re paying 10x more for remediation than prevention would have cost. It’s economically irrational.
The Security Implications Are Dire
From a security perspective, EOL dependencies are:
Known Attack Surface
- CVEs are public knowledge
- Exploit code often publicly available
- Scanners actively look for vulnerable versions
- Attackers know you probably can’t patch
Compliance Nightmare
- SOX, PCI-DSS, HIPAA all require patchable software
- “We know it’s vulnerable but can’t fix it” fails audits
- Insurance won’t cover known, unpatched vulnerabilities
Supply Chain Poison
- One EOL package can poison your entire supply chain
- Can’t ship your software to customers with vulnerability scanners
- Can’t pass vendor security reviews
This isn’t theoretical. I’ve seen companies lose major contracts because they couldn’t remediate EOL dependencies.
What Needs to Happen
From where I sit, here’s what would actually fix this:
1. Dependency Health Monitoring
- Every company should know which dependencies are at risk
- Monitor maintainer activity, funding, bus factor
- Red flag projects showing EOL warning signs
- Budget for remediation BEFORE things go EOL
2. Proactive OSS Funding
- Fund critical dependencies while they’re still maintained
- Prevent EOL instead of paying for extended support after
- The math: $500K/year prevention vs $2M+/year remediation
3. Sunset Processes for OSS
- Projects should have formal EOL procedures
- Advance warning (12+ months)
- Migration guides and alternatives
- Security support during transition period
4. Industry Standards
- Software Bill of Materials (SBOM) should be mandatory
- Dependency health should be part of security audits
- “What’s your plan if this maintainer quits?” should be a standard question
5. Insurance and Regulation
- Cyber insurance should cover (or exclude) OSS dependency risk
- Regulators should require dependency management plans
- Make it a cost of doing business, not optional
The Question Nobody Wants to Answer
Here’s what I ask clients: “If your three most critical OSS dependencies went EOL tomorrow, how long until your business is at serious risk?”
Most can’t answer. They don’t know which dependencies are most critical. They don’t have contingency plans. They’re just hoping it doesn’t happen.
Hope is not a security strategy.
We Created This Problem
Every time a company:
- Uses OSS without funding it
- Ignores maintainer burnout warnings
- Waits until projects are EOL to care
- Pays for remediation but not prevention
We’re creating more unpatchable vulnerabilities.
The 81,000 (or 400,000) unpatchable packages exist because we built an entire industry on volunteer labor, then acted surprised when the volunteers couldn’t keep up.
The Bottom Line
Living with EOL dependencies is living with known vulnerabilities. It’s accepting that your security posture includes unfixable holes.
Some companies can afford to rewrite. Most can’t.
Some companies can pay for extended support. Most won’t until forced.
Some companies will get breached through EOL dependencies. All are at risk.
The sustainable solution is boring: Fund OSS maintenance BEFORE projects go EOL. It’s cheaper, more secure, and actually solves the problem instead of managing the symptoms.
But until companies treat OSS dependencies like the critical infrastructure they are, we’ll keep generating more unpatchable vulnerabilities.
And security people like me will keep having uncomfortable conversations with executives about known vulnerabilities we can’t fix.
How do we fix this? Same answer as every other OSS sustainability question: Money. Specifically, money going to maintainers before they burn out and walk away.
Everything else is just expensive band-aids on a preventable problem.