Internet Explorer is no longer supported. Many things will still work, but your experience will be degraded and some things won't function. Please use a modern browser such as Edge, Chrome, or Firefox.

Package Vulnerability Remediation Scale (PVRS)

Introduction

Most vulnerability management programs begin with CVSS. This is reasonable: CVSS provides a consistent, vendor-neutral way to describe the theoretical severity of a vulnerability.

However, CVSS is often used as a proxy for remediation priority. In practice, that collapses many different questions into a single score: whether the vulnerable component is exposed, whether attacker-controlled input can reach the affected code path, whether exploitation is practical, and whether compromise would meaningfully affect the application.

This distinction matters especially for open-source libraries. A vulnerability in a dependency several layers removed from user input is not equivalent to the same vulnerability in an internet-facing service, even when the CVSS score is identical.

PVRS was created to address that gap.

Rather than replacing CVSS, PVRS adds the missing operational layer: a structured assessment of how a vulnerability is likely to behave in a real application environment, and how urgently it should be remediated.

Why We Created PVRS

Treating every high-severity vulnerability as immediately urgent leads to noisy queues, unnecessary upgrades, and difficulty distinguishing credible risk from theoretical impact.

When everything is treated as critical, prioritization stops working.

CVSS is not the problem. It does what it is intended to do: describe severity under a generalized, often worst-case model. But remediation decisions require a different question:

How urgent is this vulnerability in the context of how the package is actually used?

PVRS exists to answer that question.

Our Approach

PVRS is based on three observations:

CVSS remains useful as a severity signal. PVRS builds on that signal by evaluating exploitability, exposure, application context, and expected impact under realistic deployment assumptions.

The result is not just a description of what could happen, but a recommendation for what should be done.

Categories, Not Scores

PVRS uses categories rather than numeric scores.

These categories are intended to reflect practical remediation priority. They consider both the severity of the underlying issue and the likelihood that it can be exploited in a meaningful way in a typical application environment.

Risk Profiles

PVRS assessments are performed against a risk profile that reflects how software is commonly integrated and deployed.

This includes factors such as:

This allows the same vulnerability to receive different remediation guidance depending on whether it is exposed, reachable, isolated, or merely present in a dependency graph.

Conclusion

PVRS effectively keeps vulnerability management tied to action. Low-risk findings can be tracked without unnecessary disruption, moderate-risk findings can be planned into normal remediation work, and high-risk findings can trigger containment or accelerated response.

PVRS is therefore not a replacement for vulnerability severity scoring. It is a framework for turning severity into context-aware remediation decisions.