Remediation

Security · DevSecOps
Definition

Remediation in dependency security means taking action to eliminate or reduce a known vulnerability. The most common form is updating a vulnerable package to a version that contains the fix. Other forms include applying a vendor patch, using an npm override to force a safe transitive version, or — as a last resort — removing the vulnerable dependency entirely.

Types of remediation

Direct version update

The cleanest fix — bump the vulnerable package to the safe version in your manifest and run your package manager. This works when you control the direct dependency.

# npm
npm install lodash@4.17.21

# pip
pip install Django==4.2.13

# Ruby
bundle update nokogiri

Override / forced resolution

When the vulnerability is in a transitive dependency you don't control directly, you can force the package manager to use a safe version. PackageFix generates this block automatically.

// package.json — npm overrides
{
  "overrides": {
    "qs": "6.11.0"
  }
}

Virtual patch

When you can't update the package immediately (integration risk, breaking changes), you can add controls to reduce the attack surface. For example, blocking the specific input pattern that triggers the CVE at your WAF or API gateway. This is a temporary measure — not a substitute for updating.

Remediation priority

Not all CVEs need the same urgency. A practical order:

PackageFix speeds up remediation

PackageFix generates the fixed manifest with safe versions already applied — download it, run your install command, done. No manually hunting for which version fixed which CVE.

Paste your manifest — see your exact versions against the full CVE history.

Scan with PackageFix →

Free · No signup · No CLI · Runs in your browser

Common questions

What's the difference between remediation and mitigation?
Remediation eliminates the vulnerability — you update the package and the vulnerable code is gone. Mitigation reduces the risk without eliminating it — for example, blocking certain input patterns at your firewall while you wait to update. Remediation is the goal; mitigation is a temporary measure.
What if the safe version has breaking changes?
Check the package's CHANGELOG and migration guide. Many security patches are released as patch versions (1.2.3 → 1.2.4) with no breaking changes. When they are breaking (major version bumps), the fix is larger but still necessary. Start in a branch, run your test suite, fix the breaking changes.
How does PackageFix help with remediation?
PackageFix generates the fixed manifest file — your package.json, requirements.txt, or Gemfile with all CVEs patched to safe versions. Download it, replace your existing manifest, run npm install or bundle install, and you're done. For transitive vulnerabilities, it also generates the npm overrides block.
What is mean time to remediate (MTTR)?
MTTR is a security metric measuring how long it takes from when a vulnerability is discovered to when it's fixed in production. Industry benchmarks suggest under 30 days for Critical CVEs, under 60 days for High. CISA KEV entries should be under 2 weeks.

Related