← CRA Glossary
Software Supply Chain

Open Source Component

An open source component is software made available under an open source licence that is incorporated into a product. CRA manufacturers are fully responsible for the security of open source components in their products — the open source origin does not transfer liability to the component's maintainers.

An open source component is software made available under an open source licence that is incorporated into a product. CRA manufacturers are fully responsible for the security of open source components in their products — the open source origin does not transfer liability to the component's maintainers.

Software Supply Chain

What Are Open Source Components in CRA Context?

Open source components are software libraries, frameworks, operating system packages, and firmware modules made available under licences (such as MIT, Apache 2.0, GPL, or BSD) that permit use, modification, and redistribution. Modern products with digital elements typically incorporate significant numbers of open source components — a representative IoT firmware image might contain hundreds of open source packages for networking, cryptography, user interface, and utility functions. The CRA explicitly addresses open source in its recitals and introduces the 'Open Source Steward' category for non-commercial maintainers. However, the CRA makes clear that commercial manufacturers who incorporate open source components into their products bear full responsibility for those components' security — they cannot disclaim liability by citing the open source origin.

CRA reference:Recital 19, Annex I

CRA Obligations for Open Source Components

Manufacturers face three primary CRA obligations with respect to open source components:

  1. Include in SBOM: All open source components must be identified in the Annex VII SBOM, including their version, PURL, and licence information. A product SBOM that omits open source components is incomplete.
  1. Monitor for vulnerabilities: Open source components must be monitored for newly disclosed vulnerabilities throughout the product's support period. When a CVE is published for a component in the product's SBOM, the manufacturer must triage it and address it if the vulnerability poses a real risk.
  1. Apply security updates: When security patches are available for open source components, manufacturers must integrate them and release product updates within timeframes consistent with the CRA's 'without undue delay' standard. Failing to update a known-vulnerable open source component because 'it's upstream's problem' is not a defensible compliance position.
CRA reference:Annex I, Annex VII

Selecting and Vetting Open Source Components

The CRA's secure development requirements (Annex I) imply that manufacturers should exercise due diligence in selecting open source components, not just monitoring them post-integration. A component selection framework for CRA compliance should consider:

  • Maintenance status: Is the component actively maintained? An unmaintained or abandoned component will not receive security patches, creating a growing liability.
  • Security track record: Does the component have a history of prompt CVE responses? Projects with active security advisories and rapid patch releases are preferable to those that deny vulnerabilities or release patches slowly.
  • Dependency footprint: Does the component bring in a large number of transitive dependencies that expand the attack surface?
  • Licence compatibility: Is the licence compatible with the product's distribution model? (GPL-licensed components in proprietary firmware require careful legal analysis.)
  • Community health: Active, well-funded projects (e.g., those with OpenSSF Best Practices badges or corporate maintainer backing) are lower-risk than single-maintainer hobby projects.
CRA reference:Annex I

Managing the Open Source Vulnerability Lifecycle

Open source vulnerability management requires a closed-loop process that spans the entire product lifecycle:

  1. Initial inventory: At product launch, generate a complete SBOM covering all open source components with PURLs.
  2. Continuous monitoring: Feed the SBOM into a SCA platform (Dependency-Track, Snyk, etc.) and monitor for new CVEs daily.
  3. Triage: When a new CVE matches a component in the SBOM, triage it — validate the finding, assess reachability in the product, score it with CVSS/EPSS.
  4. Remediate: Update the component to the fixed version, test, and release. For components where the upstream fix has not yet been released, implement compensating controls and document them.
  5. Publish VEX: For CVEs assessed as not-affecting the product, publish VEX 'not-affected' assertions to inform users.
  6. Advisory publication: For CVEs that do affect the product and have been fixed, publish a CSAF advisory.
  7. End-of-life management: When ceasing support for a product, clearly communicate the end-of-life date so users can plan migration.

CVD Portal makes Open Source Component compliance straightforward.

Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.

Start your free portal

Frequently asked

If an open source project abandons a security patch, is the manufacturer still obligated to fix it?+

Yes. The manufacturer's CRA obligations to users are independent of what the upstream open source project does. If an upstream project abandons a component or refuses to patch a vulnerability, the manufacturer must either: patch the component themselves (fork and backport the fix); replace the component with an actively maintained alternative; or — if neither is feasible — clearly communicate to users that the vulnerability cannot be resolved, provide mitigations, and consider whether the product can continue to be sold without a fix given the CRA's essential requirements.

Does using open source components make CRA compliance harder?+

Open source components increase the surface area that requires monitoring, but good tooling makes management tractable. The benefit — faster development, battle-tested components, lower cost — typically outweighs the monitoring overhead. The risk is when manufacturers do not have visibility into their open source inventory (no SBOM) or no automated monitoring. With a current SBOM and a SCA platform, open source vulnerability management can be largely automated with human attention focused only on confirmed-affected, high-severity findings.

Are all open source licences compatible with CRA compliance?+

Open source licences affect legal obligations (copyright, redistribution, source code disclosure) but not CRA compliance directly. CRA compliance is about cybersecurity practices, not licensing. However, GPL-licensed components that require source code disclosure may indirectly affect the product's technical documentation and SBOM practices — the source disclosure obligation can serve as a useful discipline for SBOM accuracy. Licence management is a parallel legal obligation that manufacturers should address alongside CRA compliance but through separate legal review.

Browse the full CRA Compliance Checklist

See how Open Source Component fits into your complete CRA compliance programme.

View checklists →