We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in @fydemy/cms, please report it by emailing fydemy@gmail.com (or create a private security advisory on GitHub).
Please include the following information:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
We will acknowledge your email within 48 hours and send a more detailed response within 7 days indicating the next steps in handling your report.
When using @fydemy/cms, follow these security best practices:
- Use strong, random values for
CMS_SESSION_SECRET(minimum 32 characters) - Use strong passwords for
CMS_ADMIN_PASSWORD - Never commit
.envfiles to version control - Rotate credentials regularly
- Use GitHub Personal Access Tokens with minimal required permissions (only
reposcope) - Use fine-grained personal access tokens when possible
- Store tokens securely in your deployment platform's secret management
- Always use HTTPS in production
- Configure your Next.js app behind a reverse proxy or CDN
- Enable security headers (CSP, HSTS, X-Frame-Options, etc.)
- The built-in rate limiter is memory-based and resets on server restart
- For production, consider implementing Redis-based rate limiting
- Monitor failed login attempts
- The default file size limit is 10MB
- Validate file types on the client and server
- Consider implementing virus scanning for uploaded files
- Use Content Security Policy headers to prevent XSS from uploaded content
- Session cookies are httpOnly, sameSite=lax, and secure in production
- Sessions expire after 7 days
- Consider shorter session duration for sensitive applications
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release new versions as soon as possible
- Credit the reporter (unless they prefer to remain anonymous)