Clickhouse · Lifecycle Status

Clickhouse End of Life (EOL) Dates & Support Timeline

Complete end-of-life dates, support windows, and security status for all Clickhouse versions. Data sourced from endoflife.date and official vendor documentation. Updated at every deploy.

Clickhouse 25.8 reaches end of life on August 29, 2026. Plan your migration now — 112 days remaining.
Latest Active
26.2.18.8
26.2 series
Next EOL
25.8
Aug 29, 2026
Active Versions
3
of 16 total
EOL Versions
12
no longer patched
Release Cycle Timeline
EOL   Warning   Active   Today
Release cycle timeline 20252026202725.125.225.325.425.525.625.725.825.925.1025.1125.1226.126.226.326.4TODAY
All Versions
VersionLatest ReleaseRelease DateEOL DateDaysStatus
25.1 25.1.8.25 Jan 28, 2025 Apr 22, 2025 382 days past EOL EOL
25.2 25.2.2.39 Feb 28, 2025 May 22, 2025 352 days past EOL EOL
25.3 LTS 25.3.14.14 Mar 20, 2025 Mar 20, 2026 50 days past EOL EOL
25.4 25.4.13.22 Apr 22, 2025 Jul 29, 2025 284 days past EOL EOL
25.5 25.5.11.15 May 22, 2025 Aug 29, 2025 253 days past EOL EOL
25.6 25.6.13.41 Jun 26, 2025 Sep 27, 2025 224 days past EOL EOL
25.7 25.7.8.71 Jul 29, 2025 Nov 1, 2025 189 days past EOL EOL
25.8 LTS 25.8.23.13 Aug 29, 2025 Aug 29, 2026 112 days remaining Warning
25.9 25.9.7.56 Sep 27, 2025 Dec 18, 2025 142 days past EOL EOL
25.10 25.10.7.6 Nov 1, 2025 Jan 30, 2026 99 days past EOL EOL
25.11 25.11.9.34 Nov 27, 2025 Feb 27, 2026 71 days past EOL EOL
25.12 25.12.12.1 Dec 18, 2025 Mar 26, 2026 44 days past EOL EOL
26.1 26.1.11.9 Jan 30, 2026 May 5, 2026 4 days past EOL EOL
26.2 26.2.18.8 Feb 27, 2026 Already EOL Supported Active
26.3 LTS 26.3.10.62 Mar 26, 2026 Mar 26, 2027 321 days remaining Active
26.4 26.4.2.10 May 5, 2026 Already EOL Supported Active

What does Clickhouse end of life mean for your organization?

When a Clickhouse version reaches end of life, the maintainers stop issuing security patches. Vulnerabilities discovered after this date are publicly disclosed on the National Vulnerability Database, exploit code appears on GitHub, and your systems remain permanently exposed.

The CVE blind spot: Most vulnerability scanners check for known CVEs but do not flag the accumulation of unpatched vulnerabilities in EOL software. With a zero-day, nobody knows about the vulnerability. With EOL software, the vulnerability is public — listed, rated, and often weaponized — but no patch will ever exist. This is the most dangerous gap in enterprise security posture.

Organizations running EOL Clickhouse should treat it as a vulnerability class in their risk register, apply compensating controls (network segmentation, enhanced monitoring, access restriction), and prioritize migration to a supported version.

Check your full stack for EOL risk

Upload requirements.txt, package.json, or Gemfile — full EOL report instantly.

Open Stack Scanner →
Frequently Asked Questions
What is the end-of-life date for Clickhouse?
The next Clickhouse version reaching EOL is 25.8 on August 29, 2026. See the full table above for all version EOL dates.
What is the latest supported version of Clickhouse?
The latest active version of Clickhouse is 26.2.18.8. Always verify against the table above as support windows can change.
What happens when Clickhouse reaches end of life?
When Clickhouse reaches end of life, the vendor stops issuing security patches. Any CVEs disclosed after the EOL date accumulate indefinitely with no patch path — creating an ever-growing attack surface that most vulnerability scanners do not flag.
How do I check if I'm running an EOL version of Clickhouse?
Check your current version against the table above. If your version's EOL date has passed, you are running unsupported software. You can also use the endoflife.ai Stack Scanner to check your entire dependency file at once.
Is there extended support available for EOL Clickhouse versions?
Some vendors offer extended support for EOL software. Contact the original vendor or check with enterprise support providers for options.

Related Products

Data from endoflife.date API · endoflife.date · Generated at build time · How we source data →