Security Vulnerability Report Template

A responsible disclosure issue template for reporting security vulnerabilities with CVSS scoring, affected versions, proof of concept, and remediation suggestions.

Security

Detailed Explanation

Security Vulnerability Report Template

Security vulnerability reports require special handling. Many projects use GitHub's private vulnerability reporting feature, but having a template ensures consistent information collection.

Template Structure

name: "Security Vulnerability"
description: "Report a security vulnerability (use private reporting if available)"
title: "[Security]: "
labels: ["security", "priority:critical"]
body:
  - type: markdown
    attributes:
      value: |
        **Important**: If this repository supports GitHub's private vulnerability
        reporting, please use that feature instead of filing a public issue.
        Go to Security > Advisories > Report a vulnerability.
  - type: dropdown
    id: vulnerability_type
    attributes:
      label: "Vulnerability Type"
      options:
        - "Authentication Bypass"
        - "Authorization Flaw"
        - "Cross-Site Scripting (XSS)"
        - "SQL Injection"
        - "Remote Code Execution"
        - "Information Disclosure"
        - "Denial of Service"
        - "Dependency Vulnerability"
        - "Other"
    validations:
      required: true
  - type: dropdown
    id: severity
    attributes:
      label: "Estimated Severity (CVSS)"
      options:
        - "Critical (9.0-10.0)"
        - "High (7.0-8.9)"
        - "Medium (4.0-6.9)"
        - "Low (0.1-3.9)"
    validations:
      required: true
  - type: input
    id: affected_versions
    attributes:
      label: "Affected Versions"
      placeholder: ">= 2.0.0, < 2.5.3"
    validations:
      required: true
  - type: textarea
    id: description
    attributes:
      label: "Vulnerability Description"
      description: "Describe the vulnerability and its impact"
    validations:
      required: true
  - type: textarea
    id: reproduction
    attributes:
      label: "Steps to Reproduce / Proof of Concept"
      description: "Minimal steps to demonstrate the vulnerability"
    validations:
      required: true
  - type: textarea
    id: remediation
    attributes:
      label: "Suggested Remediation"
      description: "If you have ideas on how to fix this"
    validations:
      required: false

Private vs. Public Reporting

The markdown warning at the top is crucial. Public security issues can be exploited before they are fixed. Always recommend private vulnerability reporting when available.

CVSS Scoring

Including an estimated CVSS severity helps maintainers prioritize the response. The Common Vulnerability Scoring System provides a standardized way to communicate the severity of security issues.

Responsible Disclosure

Consider adding a checkbox asking reporters to confirm they will follow responsible disclosure practices and not publicize the vulnerability until a fix is available.

Use Case

Open-source projects and organizations that need a structured process for receiving security vulnerability reports, especially those without dedicated security teams or established PSIRT workflows.

Try It — Issue Template Builder

Open full tool