When evaluating whether a Potential Category 5 (i.e., CVSS 10) vulnerability may be classified as such, we assess it against three key criteria.
In practice, many vulnerabilities will not meet these criteria and, even with a highly conservative risk profile, they will not exceed Category 4.
RCE represents full compromise of the target system, allowing an attacker to execute arbitrary commands with the privileges of the application.
We require that RCE be achievable without relying on unrealistic assumptions or non-standard configurations such as:
In addition, we do not consider "sandbox escape" vulnerabilities to be eligible for Category 5 classification, as they inherently assume the application already allows execution of attacker-controlled code and treat the sandbox as the primary security boundary. Such vulnerabilities will share the following analysis:
This vulnerability is classified as a "sandbox escape" and may allow an attacker to bypass the library's intended boundaries or execution restrictions. However, under an MVSP with isolated deployments, this is best viewed as a limitation of the sandbox model rather than a practically severe vulnerability.
Our evaluation assumes that applications operate within a Minimally Viable Security Posture (MVSP). Without this baseline, systems are already susceptible to trivial compromise, such as weak credentials or unauthenticated access, which are far more likely attack vectors and make vulnerability severity distinctions less meaningful.
Under MVSP, we assume the presence of the following baseline controls:
Vulnerabilities that are only exploitable in the absence of these baseline controls are not considered Category 5 in practice.
The Package Vulnerability Remediation Scale (PVRS) is intended for OSS libraries that are integrated into an application. PVRS Categories provide actionable, context-specific guidance to balance the risks of upgrading dependencies against real-world exploitation risks.
Many standalone tools, applications, and servers are distributed through package managers such as npm, Rubygems, and NuGet. These programs (such as n8n, typescript, sidekiq, Packet) are often used in development and build workflows, but are rarely (if ever) integrated into the runtime logic of an application.
When exploitation depends on the package being operated as a standalone application, invoked manually as a CLI tool, or exposed through a separate service configuration, the vulnerability is not considered Category 5.
Such vulnerabilities will share the following analysis:
This vulnerability affects a package that is primarily operated as a standalone application, service, CLI tool, or workflow system rather than integrated as a library or dependency within application runtime logic. While exploitation may have severe impact in deployments where that standalone package is exposed or attacker-accessible, it does not create a broadly applicable compromise path for consuming applications.