Terraform · Lifecycle Status

Terraform End of Life (EOL) Dates & Support Timeline

Complete end-of-life dates, support windows, and security status for all Terraform versions. Data sourced from endoflife.date and official vendor documentation. Updated at every deploy.

Terraform 1.14.9 is actively supported. No versions approaching EOL in the next 6 months.
Latest Active
1.14.9
1.14 series
Next EOL
None upcoming
Active Versions
2
of 16 total
EOL Versions
14
no longer patched
Release Cycle Timeline
EOL   Warning   Active   Today
Release cycle timeline 202220232024202520261.01.11.21.31.41.51.61.71.81.91.101.111.121.131.141.15TODAY
All Versions
VersionLatest ReleaseRelease DateEOL DateDaysStatus
1.0 1.0.11 Jun 8, 2021 May 18, 2022 1452 days past EOL EOL
1.1 1.1.9 Dec 8, 2021 Sep 21, 2022 1326 days past EOL EOL
1.2 1.2.9 May 18, 2022 Mar 8, 2023 1158 days past EOL EOL
1.3 1.3.10 Sep 21, 2022 Jun 12, 2023 1062 days past EOL EOL
1.4 1.4.7 Mar 8, 2023 Oct 4, 2023 948 days past EOL EOL
1.5 1.5.7 Jun 12, 2023 Jan 17, 2024 843 days past EOL EOL
1.6 1.6.6 Oct 4, 2023 Apr 10, 2024 759 days past EOL EOL
1.7 1.7.5 Jan 17, 2024 Jun 26, 2024 682 days past EOL EOL
1.8 1.8.5 Apr 10, 2024 Nov 26, 2024 529 days past EOL EOL
1.9 1.9.8 Jun 26, 2024 Feb 27, 2025 436 days past EOL EOL
1.10 1.10.5 Nov 26, 2024 May 14, 2025 360 days past EOL EOL
1.11 1.11.4 Feb 27, 2025 Aug 20, 2025 262 days past EOL EOL
1.12 1.12.2 May 14, 2025 Nov 19, 2025 171 days past EOL EOL
1.13 1.13.5 Aug 20, 2025 Apr 29, 2026 10 days past EOL EOL
1.14 1.14.9 Nov 19, 2025 Already EOL Supported Active
1.15 1.15.2 Apr 29, 2026 Already EOL Supported Active

What does Terraform end of life mean for your organization?

When a Terraform version reaches end of life, the maintainers stop issuing security patches. Vulnerabilities discovered after this date are publicly disclosed on the National Vulnerability Database, exploit code appears on GitHub, and your systems remain permanently exposed.

The CVE blind spot: Most vulnerability scanners check for known CVEs but do not flag the accumulation of unpatched vulnerabilities in EOL software. With a zero-day, nobody knows about the vulnerability. With EOL software, the vulnerability is public — listed, rated, and often weaponized — but no patch will ever exist. This is the most dangerous gap in enterprise security posture.

Organizations running EOL Terraform should treat it as a vulnerability class in their risk register, apply compensating controls (network segmentation, enhanced monitoring, access restriction), and prioritize migration to a supported version.

Check your full stack for EOL risk

Upload requirements.txt, package.json, or Gemfile — full EOL report instantly.

Open Stack Scanner →
Frequently Asked Questions
What is the end-of-life date for Terraform?
See the full table above for all Terraform version EOL dates.
What is the latest supported version of Terraform?
The latest active version of Terraform is 1.14.9. Always verify against the table above as support windows can change.
What happens when Terraform reaches end of life?
When Terraform reaches end of life, the vendor stops issuing security patches. Any CVEs disclosed after the EOL date accumulate indefinitely with no patch path — creating an ever-growing attack surface that most vulnerability scanners do not flag.
How do I check if I'm running an EOL version of Terraform?
Check your current version against the table above. If your version's EOL date has passed, you are running unsupported software. You can also use the endoflife.ai Stack Scanner to check your entire dependency file at once.
Is there extended support available for EOL Terraform versions?
Some vendors offer extended support for EOL software. Contact the original vendor or check with enterprise support providers for options.

Related Products

Data from endoflife.date API · endoflife.date · Generated at build time · How we source data →