Vitess · Lifecycle Status

Vitess End of Life (EOL) Dates & Support Timeline

Complete end-of-life dates, support windows, and security status for all Vitess versions. Data sourced from endoflife.date and official vendor documentation. Updated at every deploy.

Vitess 23 reaches end of life on November 4, 2026. Plan your migration now — 179 days remaining.
Latest Active
24.0.1
24 series
Next EOL
23
Nov 4, 2026
Active Versions
1
of 12 total
EOL Versions
10
no longer patched
Release Cycle Timeline
EOL   Warning   Active   Today
Release cycle timeline 202220232024202520262027131415161718192021222324TODAY
All Versions
VersionLatest ReleaseRelease DateEOL DateDaysStatus
13 13.0.3 Feb 22, 2022 Feb 22, 2023 1172 days past EOL EOL
14 14.0.5 Jun 28, 2022 Jun 28, 2023 1046 days past EOL EOL
15 15.0.5 Oct 25, 2022 Oct 25, 2023 927 days past EOL EOL
16 16.0.7 Feb 28, 2023 Feb 28, 2024 801 days past EOL EOL
17 17.0.7 Jun 27, 2023 Jun 27, 2024 681 days past EOL EOL
18 18.0.8 Nov 6, 2023 Nov 7, 2024 548 days past EOL EOL
19 19.0.10 Mar 6, 2024 Mar 6, 2025 429 days past EOL EOL
20 20.0.8 Jun 27, 2024 Jun 27, 2025 316 days past EOL EOL
21 21.0.6 Oct 29, 2024 Oct 29, 2025 192 days past EOL EOL
22 22.0.4 Apr 29, 2025 Apr 29, 2026 10 days past EOL EOL
23 23.0.4 Nov 4, 2025 Nov 4, 2026 179 days remaining Warning
24 24.0.1 May 7, 2026 May 7, 2027 363 days remaining Active

What does Vitess end of life mean for your organization?

When a Vitess version reaches end of life, the maintainers stop issuing security patches. Vulnerabilities discovered after this date are publicly disclosed on the National Vulnerability Database, exploit code appears on GitHub, and your systems remain permanently exposed.

The CVE blind spot: Most vulnerability scanners check for known CVEs but do not flag the accumulation of unpatched vulnerabilities in EOL software. With a zero-day, nobody knows about the vulnerability. With EOL software, the vulnerability is public — listed, rated, and often weaponized — but no patch will ever exist. This is the most dangerous gap in enterprise security posture.

Organizations running EOL Vitess should treat it as a vulnerability class in their risk register, apply compensating controls (network segmentation, enhanced monitoring, access restriction), and prioritize migration to a supported version.

Check your full stack for EOL risk

Upload requirements.txt, package.json, or Gemfile — full EOL report instantly.

Open Stack Scanner →
Frequently Asked Questions
What is the end-of-life date for Vitess?
The next Vitess version reaching EOL is 23 on November 4, 2026. See the full table above for all version EOL dates.
What is the latest supported version of Vitess?
The latest active version of Vitess is 24.0.1. Always verify against the table above as support windows can change.
What happens when Vitess reaches end of life?
When Vitess reaches end of life, the vendor stops issuing security patches. Any CVEs disclosed after the EOL date accumulate indefinitely with no patch path — creating an ever-growing attack surface that most vulnerability scanners do not flag.
How do I check if I'm running an EOL version of Vitess?
Check your current version against the table above. If your version's EOL date has passed, you are running unsupported software. You can also use the endoflife.ai Stack Scanner to check your entire dependency file at once.
Is there extended support available for EOL Vitess versions?
Some vendors offer extended support for EOL software. Contact the original vendor or check with enterprise support providers for options.

Related Products

Data from endoflife.date API · endoflife.date · Generated at build time · How we source data →