Find and fix vulnerable dependencies
org.openrewrite.java.dependencies.DependencyVulnerabilityCheck
This software composition analysis (SCA) tool detects and upgrades dependencies with publicly disclosed vulnerabilities. This recipe both generates a report of vulnerable dependencies and upgrades to newer versions with fixes. This recipe by default only upgrades to the latest patch version. If a minor or major upgrade is required to reach the fixed version, this can be controlled using the maximumUpgradeDelta option. Vulnerability information comes from the GitHub Security Advisory Database, which aggregates vulnerability data from several public databases, including the National Vulnerability Database maintained by the United States government. Upgrades dependencies versioned according to Semantic Versioning. ## Customizing Vulnerability Data This recipe can be customized by extending DependencyVulnerabilityCheckBase and overriding the vulnerability data sources: - baselineVulnerabilities(ExecutionContext ctx): Provides the default set of known vulnerabilities. The base implementation loads vulnerability data from the GitHub Security Advisory Database CSV file using ResourceUtils.parseResourceAsCsv(). Override this method to replace the entire vulnerability dataset with your own curated list. - supplementalVulnerabilities(ExecutionContext ctx): Allows adding custom vulnerability data beyond the baseline. The base implementation returns an empty list. Override this method to add organization-specific vulnerabilities, internal security advisories, or vulnerabilities from additional sources while retaining the baseline GitHub Advisory Database. Both methods return List<Vulnerability> objects. Vulnerability data can be loaded from CSV files using ResourceUtils.parseResourceAsCsv(path, Vulnerability.class, consumer) or constructed programmatically. To customize, extend DependencyVulnerabilityCheckBase and override one or both methods depending on your needs. For example, override supplementalVulnerabilities() to add custom CVEs while keeping the standard vulnerability database, or override baselineVulnerabilities() to use an entirely different vulnerability data source. Last updated: 2025-12-05T0835.
Recipe source
This recipe is only available to users of Moderne.
This recipe is available under the Moderne Proprietary License.
Options
| Type | Name | Description | Example |
|---|---|---|---|
String | scope | Optional. Match dependencies with the specified scope. Default is runtime. An explanation of what each scope means can be found in the Apache Maven documentation. Valid options: compile, test, runtime, provided | runtime |
Boolean | overrideTransitive | Optional. When enabled transitive dependencies with vulnerabilities will have their versions overridden. By default only direct dependencies have their version numbers upgraded. | false |
UpgradeDelta | maximumUpgradeDelta | Optional. The maximum difference to allow when suggesting a dependency version upgrade. Patch version upgrades are the default and safest option, as patch releases assert full backwards compatibility with no breaking changes. Minor version upgrades can introduce new features but do not typically include breaking changes. Major version upgrades will typically require code changes above and beyond this recipe. Valid options: patch, minor, major | patch |
String | minimumSeverity | Optional. Only fix vulnerabilities with a severity level equal to or higher than the specified minimum. Vulnerabilities are classified as low, moderate, high, or critical based on their potential impact. Default is low, which includes all severity levels. Valid options: low, moderate, high, critical | moderate |
String | cvePattern | Optional. Only fix vulnerabilities matching this regular expression pattern. This allows filtering to specific CVEs or CVE ranges. For example, CVE-2023-.* will only check for CVEs from 2023, `CVE-(2022 | 2023)-.*will check for CVEs from 2022 or 2023,CVE-2021-44228 |
Used by
This recipe is used as part of the following composite recipes:
Examples
Example 1
DependencyVulnerabilityCheckMavenTest#transitive
Parameters
| Parameter | Value |
|---|---|
| scope | null |
| overrideTransitive | true |
| maximumUpgradeDelta | null |
| minimumSeverity | null |
| cvePattern | null |
- pom.xml
- Diff
Before
<project>
<groupId>com.mycompany.app</groupId>
<artifactId>my-app</artifactId>
<version>1</version>
<dependencies>
<dependency>
<groupId>org.openrewrite</groupId>
<artifactId>rewrite-java</artifactId>
<version>7.0.0</version>
</dependency>
</dependencies>
</project>
After
<project>
<groupId>com.mycompany.app</groupId>
<artifactId>my-app</artifactId>
<version>1</version>
<dependencyManagement>
<dependencies>
<!-- CVE-2020-36518, CVE-2021-46877, CVE-2022-42003, CVE-2022-42004 -->
<dependency>
<groupId>com.fasterxml.jackson.core</groupId>
<artifactId>jackson-databind</artifactId>
<version>2.12.7.1</version>
</dependency>
<!-- CVE-2021-47621 -->
<dependency>
<groupId>io.github.classgraph</groupId>
<artifactId>classgraph</artifactId>
<version>4.8.112</version>
</dependency>
</dependencies>
</dependencyManagement>
<dependencies>
<dependency>
<groupId>org.openrewrite</groupId>
<artifactId>rewrite-java</artifactId>
<version>7.0.0</version>
</dependency>
</dependencies>
</project>
--- pom.xml
+++ pom.xml
@@ -5,0 +5,16 @@
<artifactId>my-app</artifactId>
<version>1</version>
+ <dependencyManagement>
+ <dependencies>
+ <!-- CVE-2020-36518, CVE-2021-46877, CVE-2022-42003, CVE-2022-42004 -->
+ <dependency>
+ <groupId>com.fasterxml.jackson.core</groupId>
+ <artifactId>jackson-databind</artifactId>
+ <version>2.12.7.1</version>
+ </dependency>
+ <!-- CVE-2021-47621 -->
+ <dependency>
+ <groupId>io.github.classgraph</groupId>
+ <artifactId>classgraph</artifactId>
+ <version>4.8.112</version>
+ </dependency>
+ </dependencies>
+ </dependencyManagement>
<dependencies>
Example 2
DependencyVulnerabilityCheckGradleTest#transitive
Parameters
| Parameter | Value |
|---|---|
| scope | null |
| overrideTransitive | true |
| maximumUpgradeDelta | null |
| minimumSeverity | null |
| cvePattern | null |
- build.gradle
- Diff
Before
plugins { id 'java' }
repositories { mavenCentral() }
dependencies {
implementation 'org.openrewrite:rewrite-java:7.0.0'
}
After
plugins { id 'java' }
repositories { mavenCentral() }
dependencies {
constraints {
implementation('io.github.classgraph:classgraph:4.8.112') {
because 'CVE-2021-47621'
}
implementation('com.fasterxml.jackson.core:jackson-databind:2.12.7.1') {
because 'CVE-2020-36518, CVE-2021-46877, CVE-2022-42003, CVE-2022-42004'
}
}
implementation 'org.openrewrite:rewrite-java:7.0.0'
}
--- build.gradle
+++ build.gradle
@@ -5,0 +5,9 @@
dependencies {
+ constraints {
+ implementation('io.github.classgraph:classgraph:4.8.112') {
+ because 'CVE-2021-47621'
+ }
+ implementation('com.fasterxml.jackson.core:jackson-databind:2.12.7.1') {
+ because 'CVE-2020-36518, CVE-2021-46877, CVE-2022-42003, CVE-2022-42004'
+ }
+ }
+
implementation 'org.openrewrite:rewrite-java:7.0.0'
Unchanged
public class A {}
Usage
This recipe has no required configuration options. Users of Moderne can run it via the Moderne CLI:
- Moderne CLI
You will need to have configured the Moderne CLI on your machine before you can run the following command.
mod run . --recipe DependencyVulnerabilityCheck
If the recipe is not available locally, then you can install it using:
mod config recipes jar install org.openrewrite.recipe:rewrite-java-security:3.23.0
See how this recipe works across multiple open-source repositories
Run this recipe on OSS repos at scale with the Moderne SaaS.

The community edition of the Moderne platform enables you to easily run recipes across thousands of open-source repositories.
Please contact Moderne for more information about safely running the recipes on your own codebase in a private SaaS.
Data Tables
- MavenMetadataFailures
- VulnerabilityReport
- DependencyOriginsReport
- SourcesFileResults
- SourcesFileErrors
- RecipeRunStats
Maven metadata failures
org.openrewrite.maven.table.MavenMetadataFailures
Attempts to resolve maven metadata that failed.
| Column Name | Description |
|---|---|
| Group id | The groupId of the artifact for which the metadata download failed. |
| Artifact id | The artifactId of the artifact for which the metadata download failed. |
| Version | The version of the artifact for which the metadata download failed. |
| Maven repository | The URL of the Maven repository that the metadata download failed on. |
| Snapshots | Does the repository support snapshots. |
| Releases | Does the repository support releases. |
| Failure | The reason the metadata download failed. |
Vulnerability report
org.openrewrite.java.dependencies.table.VulnerabilityReport
A vulnerability report that includes detailed information about the affected artifact and the corresponding CVEs.
| Column Name | Description |
|---|---|
| Project | The name of the project / module taking the dependency. Relevant in repositories with multiple modules. |
| CVE | The CVE number. |
| Group | The first part of a dependency coordinate com.google.guava:guava:VERSION. |
| Artifact | The second part of a dependency coordinate com.google.guava:guava:VERSION. |
| Version | The resolved version. |
| Fixed in version | The minimum version that is no longer vulnerable. |
| Last affected version | The last version which was vulnerable. |
| Version within delta | The difference between the version in use and the fixed version is within the configured maximum version delta. The recipe attempted to upgrade the version in use to a fixed version. |
| Summary | The summary of the CVE. |
| Base score | The calculated base score. |
| Depth | Zero for direct dependencies. |
| CWEs | Common Weakness Enumeration (CWE) identifiers; semicolon separated. |
Dependency origins report
org.openrewrite.java.dependencies.table.DependencyOriginsReport
A report that maps dependencies to their originating root node represented as dependency graph. The information can be used to understand which direct dependencies are responsible for bringing in specific transitive dependencies.
| Column Name | Description |
|---|---|
| Group | The first part of a dependency coordinate com.google.guava:guava:VERSION. |
| Artifact | The second part of a dependency coordinate com.google.guava:guava:VERSION. |
| Version | The resolved version. |
| Depth | Zero for direct dependencies. |
| Dependency graph | The dependency path showing how this vulnerable dependency is included in the project. |
Source files that had results
org.openrewrite.table.SourcesFileResults
Source files that were modified by the recipe run.
| Column Name | Description |
|---|---|
| Source path before the run | The source path of the file before the run. null when a source file was created during the run. |
| Source path after the run | A recipe may modify the source path. This is the path after the run. null when a source file was deleted during the run. |
| Parent of the recipe that made changes | In a hierarchical recipe, the parent of the recipe that made a change. Empty if this is the root of a hierarchy or if the recipe is not hierarchical at all. |
| Recipe that made changes | The specific recipe that made a change. |
| Estimated time saving | An estimated effort that a developer to fix manually instead of using this recipe, in unit of seconds. |
| Cycle | The recipe cycle in which the change was made. |
Source files that errored on a recipe
org.openrewrite.table.SourcesFileErrors
The details of all errors produced by a recipe run.
| Column Name | Description |
|---|---|
| Source path | The file that failed to parse. |
| Recipe that made changes | The specific recipe that made a change. |
| Stack trace | The stack trace of the failure. |
Recipe performance
org.openrewrite.table.RecipeRunStats
Statistics used in analyzing the performance of recipes.
| Column Name | Description |
|---|---|
| The recipe | The recipe whose stats are being measured both individually and cumulatively. |
| Source file count | The number of source files the recipe ran over. |
| Source file changed count | The number of source files which were changed in the recipe run. Includes files created, deleted, and edited. |
| Cumulative scanning time (ns) | The total time spent across the scanning phase of this recipe. |
| Max scanning time (ns) | The max time scanning any one source file. |
| Cumulative edit time (ns) | The total time spent across the editing phase of this recipe. |
| Max edit time (ns) | The max time editing any one source file. |