Find vulnerabilities for a product
GET /product/{type}/{name}/{version}
Match a specific product + version against the vulnerability database and return every applicable advisory.
npm package slugs that include a / (e.g. @scope/pkg) conflict with
the route separator. URL-encode the / as %2F.
Authorizations
Section titled “Authorizations ”Parameters
Section titled “ Parameters ”Path Parameters
Section titled “Path Parameters ”Example
npmProduct ecosystem.
Example
axiosNpm package slug or WordPress plugin/theme slug. Use wordpress when type=wordpress.
Example
0.21.4Concrete version (e.g. 0.21.4) or * to return every advisory for the product.
Query Parameters
Section titled “Query Parameters ”Pass details to include the full advisory body (advisory_details) per item.
Responses
Section titled “ Responses ”Matched advisories (possibly empty).
object
Per-item shape shared across list endpoints when platform=npm.
object
Stable Patchstack vulnerability id.
Example
46500Human-readable title (prefixed with NPM: for npm advisories).
Example
NPM: OpenClaw: ...When the vulnerability was publicly disclosed.
When the row was inserted into the Patchstack DB. Drives /latest windowing.
Public Patchstack vulnerability page (token-tagged).
High-level vulnerability category.
Example
Other Vulnerability TypeFirst CVE identifier, or empty string when none is assigned.
Example
2026-41331Whether exploitation has been observed in the wild.
1 (low) to 3 (high).
Full advisory body (markdown). Only present when ?include=details was passed.
object
object
object
object
External reference URLs (advisories, commits, tags).
GHSA identifier when the advisory came from the GitHub Advisory Database.
object
Affected version range (e.g. <= 2026.3.28).
First fixed version.
Structured list of patch ranges for advisories with multiple patch ranges.
object
Example
{ "id": 46500, "title": "NPM: OpenClaw: ...", "disclosed_at": "2026-04-03T03:15:56+00:00", "created_at": "2026-04-21T08:38:34+00:00", "url": "https://patchstack.com/database/npm/npm/openclaw/vulnerability/...", "vuln_type": "Other Vulnerability Type", "cve": "2026-41331", "is_exploited": false, "patch_priority": 2, "advisory_details": "## Summary\n...", "product": { "id": 23595, "name": "openclaw", "slug": "openclaw" }, "cvss": { "score": 6.9, "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, "cwe": { "id": 770, "name": "Allocation of Resources Without Limits or Throttling" }, "capec": { "id": null, "name": null }, "references": [ "https://github.com/openclaw/openclaw/security/advisories/GHSA-m6fx-m8hc-572m", "https://github.com/openclaw/openclaw/releases/tag/v2026.3.31" ], "ghsa": "GHSA-m6fx-m8hc-572m", "version_info": { "affected": "<= 2026.3.28", "fixed": "2026.3.31", "patched_ranges": [] }}Missing or invalid PSKey header.
API key not authorised for the requested endpoint.
Invalid parameter combination (e.g. cursor + page), invalid platform, or per_page > 500.
Rate limit exceeded.