Skip to main content

Documentation Index

Fetch the complete documentation index at: https://www.activepieces.com/docs/llms.txt

Use this file to discover all available pages before exploring further.

A security advisory is the public artifact we publish after a vulnerability is reported and fixed. This playbook is the lifecycle that produces one. Reporter-facing policy lives in SECURITY.md.

Triage

1

Reproduce

Reproduce locally before scoring. If it doesn’t reproduce, ask the reporter for clarification.
2

Check scope

Compare against the Out of scope list in SECURITY.md. If out of scope, reply with the reason and close.
3

Score with CVSS 4.0

Use the FIRST calculator. Record the score and vector.
Buckets: 0.1–3.9 low, 4.0–6.9 medium, 7.0–8.9 high, 9.0–10 critical.
4

Acknowledge within 3 business days

Reply to the reporter with severity, expected resolution date, and a confidentiality reminder. Clock starts at the report timestamp.

Private fix

1

Open a draft advisory

Repo → SecurityAdvisoriesNew draft security advisory.
Set affected versions, severity, and a neutral summary.
Save as draft. You’ll fill the rest of the metadata in Draft advisory later.
2

Use a temporary private fork

From the draft advisory, click Start a temporary private fork.
Fix on a security/<ghsa-id> branch inside it.
3

Add a regression test, then merge

Run npm run lint-dev, npm run test-unit, npm run test-api.
Add a regression test. Merge the PR inside the private fork.
A public PR or push collapses the embargo. Double-check the remote URL before pushing.

Draft advisory

1

Request CVE ID (optional)

In the draft advisory: CVE IDRequest CVE. GitHub assigns one within ~1 business day.
2

Fill the metadata

Fields must match the in-app SecurityAdvisory shape: summary, description, severity, cvssScore, vulnerableVersionRange (e.g. < 0.71.1), patchedVersion. Use the advisory body template for the description.
3

Set the embargo

Default 60 days. Hold publication until the patch is on cloud production and customers have been notified. Publish sooner if actively exploited or the reporter has set an earlier date.

Patch release

Always a patch bump (e.g. 0.71.00.71.1). Never bundle with feature commits.
1

Cut a hotfix branch

Follow the cloud-hotfix flow in Releases: deploy/cloud/YYYY-MM-DD branch, then trigger continuous-delivery-cloud.yml with cloud-hotfix.
2

Bump versions

Patch-bump root package.json. Bump packages/shared if touched. If the fix has a migration, set release = '<patched-version>' per Database Migrations.
3

Verify on canary

Wait for canary to confirm before promoting to production.
4

Draft the changelog entry

Draft (don’t post yet) for docs/about/changelog.mdx:
<Update label="<Month Year>" description="Security advisory <CVE-ID>">
  ### Security
  Fixed <one-line summary> (<CVE-ID>, <severity>). Upgrade to <patched-version> immediately.
</Update>

Customer disclosure

7-day lead time before public publication. Patched version must already be on cloud production before sending.
Subject: [Security] Activepieces <severity> advisory <CVE-ID> — patched in <version>

Cloud customers are already protected — the fix was deployed on <date>.
Self-managed customers should upgrade to <patched-version> before
<public-disclosure-date>, when we'll publish CVE <CVE-ID> on GitHub.

Mitigation if you cannot upgrade: <workaround or "none">
Re-confirm the disclosure date with the reporter before sending.

Public publication

1

Publish the advisory

In the draft advisory, click Publish advisory. This makes the CVE public.
2

Confirm the advisory reaches admins

Confirm the new advisory appears on the platform health page (/platform/infrastructure/health). Source feeds cache for 15 minutes, so allow that delay before troubleshooting.
3

Post the changelog

Commit the changelog entry drafted in Patch release.

Postmortem

Required for high/critical, optional for medium, skip for low. Create docs/handbook/engineering/postmortems/YYYY-MM-DD-<slug>.mdx using the existing structure (see 2026-03-19 Redis and delay overload).

References

Advisory body template

## Summary
One paragraph plain-language explanation of the vulnerability — what it is, no exploit detail.

## Impact
What an attacker can achieve, what data or systems are at risk, and which versions and configurations are affected.

## Patches
The patched version and how to upgrade.

## Workarounds
Mitigations available to users who cannot upgrade immediately, or note that the only safe option is to upgrade.

## References
The fix commit (visible after publication), related CVEs or upstream advisories, and reporter credit.