Keep your Node.js apps 
secure after end-of-life
— without migrating.

Drop-in security patches for Node.js 12, 14, 16, 18, and 20. No code changes, no forced migrations — keep shipping while we keep you secure.

BACKED BY CORE CONTRIBUTORS

OpenJS Foundation logo

Partner

TRUSTED BY ENTERPRISE

Google logoMicrosoft logoFinra logoSAP logo
Node.js EOL dates

20+

CVEs we currently mitigate for Node.js

Updated continuosly

What you get from Never-Ending Support (NES) for Node.js

Security Patches

A new NES release every time we find, validate, and fix a CVE that affects your version. Continuous coverage — not a one-time backport.

28 CVEs already mitigated

Continuously updated as new vulnerabilities are disclosed.

Same-day response on critical issues

Security and application-breaking issues are top priority.

On-Demand EOL Risk Assessment

81,000+ packages have known CVEs and zero fix path. Your SCA flags the vulnerabilities, but our EOL Dataset (EOL DS) tells you which software is dead.

Try it Now →

Drop-In Compatibility

Point your registry at us, rebuild, ship. No code changes. No migrations. No find-and-replace.

Versions 12, 14, 16, 18, 20

Active and EOL versions — pick what you're running.

28+ CVEs already mitigated

x64 and ARM64. Containers, Lambda, GitHub Actions.

Support Commitment

Engineered with the contractual and compliance commitments enterprise procurement teams require.

SLA Compliance

HeroDevs provides SLAs that ensure compliance by providing incident response and remediation in accordance with industry-standard regulations, including SOC 2, FedRAMP, PCI, and HIPAA.

Learn More →

Commercial Contract Assurances

OSS NES is not only secure and compatible, but is offered with industry-standard commercial assurances for the use of HeroDevs Services.

Learn More →

One command. Your existing setup. No code changes.

Point your package manager at the NES registry and rebuild. Works with NVM, AWS Lambda, GitHub Actions, RPM, Artifactory, Nexus.

Install Node.js NES
$export NVM_NODEJS_ORG_MIRROR=https://registry.nes.herodevs.com/nodejs/nes
$export NVM_AUTH_HEADER="Bearer <token>"
$nvm install v18.20.6-nes
Downloading and installing node v18.20.6-nes...
Now using node v18.20.6-nes (npm v10.8.2) ✓
Version
Linux x64
Linux ARM
MacOS
Windows
RHEL 8
v12
-
-
v14
-
-
v16
-
v18
v20
-
-
Works with
nvm logo

nvm

AWS Lambda logo

AWS Lambda

GitHub Actions logo

GitHub Actions

inventory icon

RPM

package icon

Artifactory

manufacturing icon

Nexus

0 CVEs Mitigated - And Counting

Switch to NES for Node.js in minutes to fix these vulnerabilities immediately.
Severity
CVE
Category
Version(s) Affected
Published Date
Medium
Denial of Service
<20.20.2 >=22.0.0 <22.22.2 >=24.0.0 <24.14.1 >=25.0.0 <25.8.2
Apr 13, 2026
High
Uncontrolled Resource Consumption
v4 < v20.20.0, v22 < v22.22.0, v24 < v24.13.0, v25 < v25.3.0
Jan 13, 2026
High
Path Traversal
4.0 < 20.19.4, 22 < 22.17.1, 24 < 24.4.1
Jul 15, 2025
Medium
HTTP Request Smuggling
4.0 < 20.19.1
May 14, 2025
High
Cryptographic Weakness
4.0 < 20.19.1, 22 < 22.15.0, 24 < 24.0.1
May 14, 2025
Medium
Denial of Service
4.0 < 18.20.6, 20 < 20.18.2
Feb 7, 2025
Medium
Path Traversal
4.0 < 18.20.6, 20 < 20.18.2
Jan 28, 2025
High
Command Injection
4.0 <= 18.20.2, 20 < 20.12.2
Jan 9, 2025
High
HTTP Request Smuggling
>=16.0.0 <16.20.1, >=18.0.0 <18.16.1, >=20.0.0 <20.3.1
Oct 16, 2024
Low
Information Exposure
>=16.0.0 <=16.20.2
Oct 15, 2024
Medium
Denial of Service
>=14.0.0 <=14.21.3, >=16.0.0 <=16.20.2
Oct 15, 2024
Medium
Cryptographic Weakness
4.0 < 18.19.1, 20 < 20.11.1
Sep 7, 2024
High
Command Injection
4.0 < 18.20.4, 20.0 < 20.15.1, 22.0< 22.4.1
Sep 7, 2024
Medium
HTTP Request Smuggling
4.0 < 18.20.1, 20 < 20.12.1
May 7, 2024
Medium
HTTP Request Smuggling
<21.7.2, <20.12.1, <v18.20.1, <= 16.20.2, <=v14.21.3, <= v12.22.12
May 1, 2024
High
Uncontrolled Resource Consumption
4 <= 18.20.0, 20 <= 20.12.0
Apr 9, 2024
High
Privilege Escalation
4.0 < 18.19.1, 20 < 20.11.1
Feb 20, 2024
Medium
Denial of Service
<21.6.2, <20.11.1, <v18.19.1, <= 16.20.2
Feb 14, 2024
High
Denial of Service
<21.6.2, <20.11.1, <v18.19.1, <= 16.20.2, <=v14.21.3, <= v12.22.12
Feb 14, 2024
Medium
Cryptographic Weakness
4.0 < 16.20.1, 18 < 18.16.1, 20 < 20.3.1
Nov 28, 2023
Medium
Insufficient Verification of Data Authenticity
4.0 <= 18.18.1, 20 < 20.8.1
Oct 18, 2023
Medium
Privilege Escalation
4 <= 16.20.1, 0 <= 18.17.0, 0 <= 20.5.0
Aug 24, 2023
Medium
HTTP Request Smuggling
4.0 < 16.20.1, 18 < 18.16.1, 20 < 20.3.1
Jun 30, 2023
Medium
HTTP Request Smuggling
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Dec 5, 2022
High
Resource Injection
4.0 < 14.20.0, 16 < 16.20.0, 18 < 18.5.0
Jul 14, 2022
Medium
HTTP Request Smuggling
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022
High
Authorization Bypass
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022
Medium
HTTP Request Smuggling
4.0 < 14.20.0, 16 < 16.20.0, 18 < 18.5.0
Jul 14, 2022
Medium
HTTP Request Smuggling
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022
Filtering by:
Severity
=
Text for Severity
Close icon
Clear Filters
Severity
ID
Category
Version(s) Affected
Published Date
Medium
Insufficient Verification of Data Authenticity
4.0 <= 18.18.1, 20 < 20.8.1
Oct 18, 2023
Medium
Privilege Escalation
4 <= 16.20.1, 0 <= 18.17.0, 0 <= 20.5.0
Aug 24, 2023
Medium
HTTP Request Smuggling
4.0 < 16.20.1, 18 < 18.16.1, 20 < 20.3.1
Jun 30, 2023
Medium
HTTP Request Smuggling
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Dec 5, 2022
High
Resource Injection
4.0 < 14.20.0, 16 < 16.20.0, 18 < 18.5.0
Jul 14, 2022
Medium
HTTP Request Smuggling
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022
High
Authorization Bypass
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022
Medium
HTTP Request Smuggling
4.0 < 14.20.0, 16 < 16.20.0, 18 < 18.5.0
Jul 14, 2022
Medium
HTTP Request Smuggling
4.0 < 14.20.1, 16 < 16.17.1, 18 < 18.9.1
Jul 14, 2022

Built by the people who built Node.js

We Partner With Core Contributors

We collaborate with the Node.js project to ensure NES is the same quality you expect. By involving core maintainers, we set a new standard for sunsetted open source to make NES as dependable as the original.

Vue LogoAngular LogoDrupal Association logoNuxt LogoProtractor logo
OpenJS Foundation logo
HeroDevs logo

Founding member of the OpenJS Foundation's Ecosystem Sustainability Program (ESP) and Gold Member of the OpenJS Foundation. NES for Node.js, ESLint, and other OpenJS projects.

Learn More →
User icon wiht computer

We Give Back to Open Source

Open source maintainers do critical work, but rarely get paid for it.

HeroDevs is putting $20 million toward changing that — funding the creators and projects that keep the ecosystem running, with grants from $2,500 to $250,000.

We’ve written patches for unmaintained codebases, tracked down vulnerabilities where no one else was looking, and kept critical systems running safely without rushed rewrites. This fund builds on that work, so maintainers can keep doing what they do best.

NES for Node.js Use Cases

Security: Close the CVE Exposure Window

BEFORE — THE PAIN

AFTER — WITH HERODEVS

Hundreds of Node.js services are stuck on EOL versions 18 and 20. Scanners flag for every deploy, no upstream patches are coming, and when a new CVE drops, the window between disclosure and exploit is wide open.

NES for Node.js drops in across on-prem or cloud service (AWS, Azure, GCP) with no app code changes. SLA-backed CVE patches resume on versions 12–20, with proactive remediation sometimes even before public disclosure. The fleet moves from exposed to defended in a single deployment cycle.

Compliance: Close an Open Audit Finding

BEFORE — THE PAIN

AFTER — WITH HERODEVS

Internal audit, SOC 2, and a customer security questionnaire all flag EOL Node.js. There is no remediation path — the project does not patch EOL versions — and executive leaders have no defensible answer for auditors or the board.

NES for Node.js delivers commercial support with committed SLAs and the endorsement of the OpenJS Foundation. Scanners stop flagging CVEs, findings close, and questionnaires can reference a named, vendor-backed runtime aligned with PCI DSS, HIPAA, SOC 2, DORA, NIS2, CRA, and other standards and regulations expectations.

Business Continuity: Migrate on Your Terms, Not the EOL Clock

BEFORE — THE PAIN

AFTER — WITH HERODEVS

The backlog is full, headcount is frozen, and cloud providers are deprecating EOL Node.js runtimes for new deployments. A rushed migration across hundreds of services risks production incidents and pulls engineers away from the roadmap.

NES for Node.js is a drop-in replacement across the fleet — no code changes, deployable on-prem or in a cloud service. Teams get 1–3 years of breathing room to plan a proper migration while the runtime stays secure, compliant, and production-stable.

Frequently Asked Questions

Does HeroDevs have an SLA for NES for Node.js?
What Node.js versions does NES support?
Does NES for Node.js help with compliance?
Why do I need NES for Node.js?
How does licensing work?
I got an error like "EOL/Obsolete Software: Node.js 12.x Detected." What can I do?

Contact Us

Got questions about Never-Ending Support for your open-source library? We're here to help!

Discover how HeroDevs NES Products can keep your systems secure and compliant.

Learn how our solutions can deliver value to your organization.

Get detailed pricing information tailored to your needs.

Google logoLilly logoAbbott logoBox logoEG logoHitachi logoDropbox logoNHS logoWorkday logoFinra logoMicrosoft logoSantander logoSAP logo
Talk to an Expert
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.