Complete end-of-life dates, support windows, and security status for all Terraform versions. Data sourced from endoflife.date and official vendor documentation. Updated at every deploy.
| Version | Latest Release | Release Date | EOL Date | Days | Status |
|---|---|---|---|---|---|
| 1.0 | 1.0.11 | Jun 8, 2021 | May 18, 2022 | 1452 days past EOL | EOL |
| 1.1 | 1.1.9 | Dec 8, 2021 | Sep 21, 2022 | 1326 days past EOL | EOL |
| 1.2 | 1.2.9 | May 18, 2022 | Mar 8, 2023 | 1158 days past EOL | EOL |
| 1.3 | 1.3.10 | Sep 21, 2022 | Jun 12, 2023 | 1062 days past EOL | EOL |
| 1.4 | 1.4.7 | Mar 8, 2023 | Oct 4, 2023 | 948 days past EOL | EOL |
| 1.5 | 1.5.7 | Jun 12, 2023 | Jan 17, 2024 | 843 days past EOL | EOL |
| 1.6 | 1.6.6 | Oct 4, 2023 | Apr 10, 2024 | 759 days past EOL | EOL |
| 1.7 | 1.7.5 | Jan 17, 2024 | Jun 26, 2024 | 682 days past EOL | EOL |
| 1.8 | 1.8.5 | Apr 10, 2024 | Nov 26, 2024 | 529 days past EOL | EOL |
| 1.9 | 1.9.8 | Jun 26, 2024 | Feb 27, 2025 | 436 days past EOL | EOL |
| 1.10 | 1.10.5 | Nov 26, 2024 | May 14, 2025 | 360 days past EOL | EOL |
| 1.11 | 1.11.4 | Feb 27, 2025 | Aug 20, 2025 | 262 days past EOL | EOL |
| 1.12 | 1.12.2 | May 14, 2025 | Nov 19, 2025 | 171 days past EOL | EOL |
| 1.13 | 1.13.5 | Aug 20, 2025 | Apr 29, 2026 | 10 days past EOL | EOL |
| 1.14 | 1.14.9 | Nov 19, 2025 | Already EOL | Supported | Active |
| 1.15 | 1.15.2 | Apr 29, 2026 | Already EOL | Supported | Active |
When a Terraform version reaches end of life, the maintainers stop issuing security patches. Vulnerabilities discovered after this date are publicly disclosed on the National Vulnerability Database, exploit code appears on GitHub, and your systems remain permanently exposed.
The CVE blind spot: Most vulnerability scanners check for known CVEs but do not flag the accumulation of unpatched vulnerabilities in EOL software. With a zero-day, nobody knows about the vulnerability. With EOL software, the vulnerability is public — listed, rated, and often weaponized — but no patch will ever exist. This is the most dangerous gap in enterprise security posture.
Organizations running EOL Terraform should treat it as a vulnerability class in their risk register, apply compensating controls (network segmentation, enhanced monitoring, access restriction), and prioritize migration to a supported version.
Upload requirements.txt, package.json, or Gemfile — full EOL report instantly.
Open Stack Scanner →