We provide security updates for the following versions:
| Version | Supported |
|---|---|
| > 1.0 | ✅ |
| < 1.0 | ❌ |
We recommend always using the latest release to ensure you have the most recent security patches.
We take security vulnerabilities seriously. If you discover a security issue in Godot CEF, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (Preferred): Use GitHub's private vulnerability reporting to submit a confidential report.
-
Email: Contact the maintainer directly at security concerns related to this project.
When reporting a vulnerability, please include:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Affected versions
- Potential impact of the vulnerability
- Any possible mitigations you've identified
- Initial Response: We aim to acknowledge receipt of your report within 48 hours.
- Status Update: We will provide a more detailed response within 7 days, including our assessment and planned timeline.
- Resolution: We strive to resolve critical vulnerabilities within 30 days, depending on complexity.
- We follow coordinated disclosure practices.
- We will work with you to understand and resolve the issue.
- Once a fix is available, we will publicly acknowledge your contribution (unless you prefer to remain anonymous).
Godot CEF embeds Chromium via CEF. Security of the underlying browser engine is dependent on the CEF version used:
- We regularly update to newer CEF versions to incorporate upstream Chromium security fixes.
- Check your CEF version against CEF releases for known vulnerabilities.
When using Godot CEF in your applications:
- Trusted Content Only: Only load web content from sources you trust.
- JavaScript Execution: Be aware that
eval()executes arbitrary JavaScript. Validate any dynamic content. - IPC Messages: Sanitize and validate all messages received via
ipc_messagesignals before processing. - Local File Access: The
res://protocol provides access to your Godot project files. Be cautious when loading user-provided URLs.
- Keep Updated: Always use the latest version of Godot CEF.
- Content Security Policy: When loading your own HTML, implement appropriate CSP headers.
- Input Validation: Validate all data passed between GDScript and JavaScript.
- Minimize Privileges: Only enable features you need (e.g., only enable DevTools in development).
Security updates will be announced through:
We appreciate the security research community and thank everyone who has responsibly disclosed vulnerabilities to help keep Godot CEF secure.