Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ckeditor@0?distro=sid
purl pkg:deb/debian/ckeditor@0?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-3htn-j487-3ydn Cross-site scripting (XSS) in the CKEditor 5 real-time collaboration package ### Impact During a recent internal audit, we identified a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 real-time collaboration package. This vulnerability can lead to unauthorized JavaScript code execution and affects user markers, which represent users' positions within the document. This vulnerability affects only installations with [Real-time collaborative editing](https://ckeditor.com/docs/ckeditor5/latest/features/collaboration/real-time-collaboration/real-time-collaboration.html) enabled. ### Patches The problem has been recognized and patched. The fix will be available in version 44.2.1 (and above). ### For more information Email us at [security@cksource.com](mailto:security@cksource.com) if you have any questions or comments about this advisory. CVE-2025-25299
GHSA-j3mm-wmfm-mwvh
VCID-3tqv-ppue-57fr CKEditor4 low-risk cross-site scripting (XSS) vulnerability linked to potential domain takeover ### Affected Packages The issue impacts only editor instances with enabled [version notifications](https://ckeditor.com/docs/ckeditor4/latest/api/CKEDITOR_config.html#cfg-versionCheck). Please note that this feature is disabled by default in all CKEditor 4 LTS versions. Therefore, if you use CKEditor 4 LTS, it is highly unlikely that you are affected by this vulnerability. If you are unsure, please [contact us](mailto:security@cksource.com). ### Impact A theoretical vulnerability has been identified in CKEditor 4.22 (and above). In a highly unlikely scenario where an attacker gains control over the https://cke4.ckeditor.com domain, they could potentially execute an attack on CKEditor 4 instances. Although the vulnerability is purely hypothetical, we have addressed it in CKEditor 4.25.0-lts to ensure compliance with security best practices. ### Patches The issue has been recognized and patched. The fix is available in version 4.25.0-lts. ### For More Information If you have any questions or comments about this advisory, please email us at [security@cksource.com](mailto:security@cksource.com). CVE-2024-43411
GHSA-6v96-m24v-f58j
VCID-usbf-pmfq-1fb6 Cross-site scripting (XSS) in the clipboard package ### Impact During a recent internal audit, we identified a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 clipboard package. This vulnerability could be triggered by a specific user action, leading to unauthorized JavaScript code execution, if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability affects **only** installations where the editor configuration meets the following criteria: 1. The [**Block Toolbar**](https://ckeditor.com/docs/ckeditor5/latest/getting-started/setup/toolbar.html#block-toolbar) plugin is enabled. 1. One of the following plugins is also enabled: - [**General HTML Support**](https://ckeditor.com/docs/ckeditor5/latest/features/html/general-html-support.html) with a configuration that permits unsafe markup. - [**HTML Embed**](https://ckeditor.com/docs/ckeditor5/latest/features/html/html-embed.html). ### Patches The problem has been recognized and patched. The fix will be available in version 43.1.1 (and above), and explicitly in version 41.3.2. ### Workarounds It's highly recommended to update to the version 43.1.1 or higher. However, if the update is not an option, we recommend disabling the block toolbar plugin. ### For more information Email us at [security@cksource.com](mailto:security@cksource.com) if you have any questions or comments about this advisory. CVE-2024-45613
GHSA-rgg8-g5x8-wr9v

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:54:54.313581+00:00 Debian Importer Fixing VCID-3htn-j487-3ydn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:26:21.847317+00:00 Debian Importer Fixing VCID-usbf-pmfq-1fb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:52:02.146066+00:00 Debian Importer Fixing VCID-3htn-j487-3ydn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:02:31.231277+00:00 Debian Importer Fixing VCID-usbf-pmfq-1fb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:21:10.516139+00:00 Debian Importer Fixing VCID-3tqv-ppue-57fr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:35.204783+00:00 Debian Importer Fixing VCID-3htn-j487-3ydn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:09.790125+00:00 Debian Importer Fixing VCID-usbf-pmfq-1fb6 https://security-tracker.debian.org/tracker/data/json 38.1.0