Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ckeditor@4.16.0%2Bdfsg-2?distro=bullseye
purl pkg:deb/debian/ckeditor@4.16.0%2Bdfsg-2?distro=bullseye
Next non-vulnerable version 4.16.2+dfsg-1
Latest non-vulnerable version 4.19.1+dfsg-1
Risk 4.0
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-17pr-6guy-53ge
Aliases:
CVE-2021-32808
GHSA-6226-h7ff-ch6c
Cross-site Scripting ckeditor is an open source WYSIWYG HTML editor with rich content support. A vulnerability has been discovered in the clipboard Widget plugin if used alongside the undo feature. The vulnerability allows a user to abuse undo functionality using malformed widget HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at The problem has been recognized and patched. The fix will be available
4.16.2+dfsg-1
Affected by 0 other vulnerabilities.
4.19.1+dfsg-1
Affected by 0 other vulnerabilities.
VCID-4x92-vapt-n7dz
Aliases:
CVE-2021-41165
GHSA-7h26-63m7-qhf2
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CKEditor4 is an open source WYSIWYG HTML editor. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at The problem has been recognized and patched.
4.19.0+dfsg-1
Affected by 0 other vulnerabilities.
4.19.1+dfsg-1
Affected by 0 other vulnerabilities.
VCID-8hvk-a5es-v3e4
Aliases:
CVE-2021-41164
GHSA-pvmx-g8h5-cprj
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CKEditor4 is an open source WYSIWYG HTML editor. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code.
4.19.0+dfsg-1
Affected by 0 other vulnerabilities.
4.19.1+dfsg-1
Affected by 0 other vulnerabilities.
VCID-sd2a-hmu2-wbax
Aliases:
CVE-2021-32809
GHSA-7889-rm5j-hpgg
Code Injection ckeditor is an open source WYSIWYG HTML editor with rich content support. A potential vulnerability has been discovered in CKEdit The vulnerability allowed to abuse paste functionality using malformed HTML, which could result in injecting arbitrary HTML into the editor.
4.16.2+dfsg-1
Affected by 0 other vulnerabilities.
4.19.1+dfsg-1
Affected by 0 other vulnerabilities.
VCID-un66-k85j-b7d2
Aliases:
CVE-2022-24728
GHSA-4fc4-4p5g-6w89
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.
4.19.0+dfsg-1
Affected by 0 other vulnerabilities.
4.19.1+dfsg-1
Affected by 0 other vulnerabilities.
VCID-vj35-jtgq-8qbv
Aliases:
CVE-2021-37695
GHSA-m94c-37g6-cjhc
Cross-site Scripting ckeditor is an open source WYSIWYG HTML editor with rich content support. A potential vulnerability has been discovered in CKEdit The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at The problem has been recognized and patched.
4.16.2+dfsg-1
Affected by 0 other vulnerabilities.
4.19.1+dfsg-1
Affected by 0 other vulnerabilities.
VCID-xhp7-kqdk-tfeu
Aliases:
CVE-2022-24729
GHSA-f6rf-9m92-x2hh
Improper Input Validation CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds.
4.19.0+dfsg-1
Affected by 0 other vulnerabilities.
4.19.1+dfsg-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (8)
Vulnerability Summary Aliases
VCID-3htn-j487-3ydn Cross-site scripting (XSS) in the CKEditor 5 real-time collaboration package ### Impact During a recent internal audit, we identified a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 real-time collaboration package. This vulnerability can lead to unauthorized JavaScript code execution and affects user markers, which represent users' positions within the document. This vulnerability affects only installations with [Real-time collaborative editing](https://ckeditor.com/docs/ckeditor5/latest/features/collaboration/real-time-collaboration/real-time-collaboration.html) enabled. ### Patches The problem has been recognized and patched. The fix will be available in version 44.2.1 (and above). ### For more information Email us at [security@cksource.com](mailto:security@cksource.com) if you have any questions or comments about this advisory. CVE-2025-25299
GHSA-j3mm-wmfm-mwvh
VCID-3tqv-ppue-57fr CKEditor4 low-risk cross-site scripting (XSS) vulnerability linked to potential domain takeover ### Affected Packages The issue impacts only editor instances with enabled [version notifications](https://ckeditor.com/docs/ckeditor4/latest/api/CKEDITOR_config.html#cfg-versionCheck). Please note that this feature is disabled by default in all CKEditor 4 LTS versions. Therefore, if you use CKEditor 4 LTS, it is highly unlikely that you are affected by this vulnerability. If you are unsure, please [contact us](mailto:security@cksource.com). ### Impact A theoretical vulnerability has been identified in CKEditor 4.22 (and above). In a highly unlikely scenario where an attacker gains control over the https://cke4.ckeditor.com domain, they could potentially execute an attack on CKEditor 4 instances. Although the vulnerability is purely hypothetical, we have addressed it in CKEditor 4.25.0-lts to ensure compliance with security best practices. ### Patches The issue has been recognized and patched. The fix is available in version 4.25.0-lts. ### For More Information If you have any questions or comments about this advisory, please email us at [security@cksource.com](mailto:security@cksource.com). CVE-2024-43411
GHSA-6v96-m24v-f58j
VCID-c8r2-wpf3-47f9 CKEditor 4 ReDoS Vulnerability It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted text into the Styles input of specific dialogs (in the Advanced Tab for Dialogs plugin). CVE-2021-26271
GHSA-jv4c-7jqq-m34x
VCID-h5zz-wz8f-2uf6 Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4 It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin). CVE-2021-26272
GHSA-wpvm-wqr4-p7cw
VCID-qb4j-9tz7-m7a2 Cross-site Scripting CKEditor allows user-assisted XSS involving a source-mode paste. CVE-2018-17960
GHSA-g68x-vvqq-pvw3
VCID-s8u8-xbdk-87dj ckeditor4 vulnerable to cross-site scripting A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because `--!>` is mishandled. CVE-2021-33829
GHSA-rgx6-rjj4-c388
VCID-tkcr-ecev-k3af The Preview plugin in CKEditor allows Cross-site scripting (XSS) Cross-site scripting (XSS) vulnerability in the Preview plugin before 4.4.3 in CKEditor allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. CVE-2014-5191
GHSA-v27h-j97p-wqmx
VCID-usbf-pmfq-1fb6 Cross-site scripting (XSS) in the clipboard package ### Impact During a recent internal audit, we identified a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 clipboard package. This vulnerability could be triggered by a specific user action, leading to unauthorized JavaScript code execution, if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability affects **only** installations where the editor configuration meets the following criteria: 1. The [**Block Toolbar**](https://ckeditor.com/docs/ckeditor5/latest/getting-started/setup/toolbar.html#block-toolbar) plugin is enabled. 1. One of the following plugins is also enabled: - [**General HTML Support**](https://ckeditor.com/docs/ckeditor5/latest/features/html/general-html-support.html) with a configuration that permits unsafe markup. - [**HTML Embed**](https://ckeditor.com/docs/ckeditor5/latest/features/html/html-embed.html). ### Patches The problem has been recognized and patched. The fix will be available in version 43.1.1 (and above), and explicitly in version 41.3.2. ### Workarounds It's highly recommended to update to the version 43.1.1 or higher. However, if the update is not an option, we recommend disabling the block toolbar plugin. ### For more information Email us at [security@cksource.com](mailto:security@cksource.com) if you have any questions or comments about this advisory. CVE-2024-45613
GHSA-rgg8-g5x8-wr9v

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:01:51.452750+00:00 Debian Importer Fixing VCID-c8r2-wpf3-47f9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:48:39.855468+00:00 Debian Importer Fixing VCID-3htn-j487-3ydn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:21:22.260569+00:00 Debian Importer Fixing VCID-s8u8-xbdk-87dj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:14:33.229232+00:00 Debian Importer Fixing VCID-tkcr-ecev-k3af https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:11.180267+00:00 Debian Importer Fixing VCID-qb4j-9tz7-m7a2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:26:16.033551+00:00 Debian Importer Fixing VCID-usbf-pmfq-1fb6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:20:15.141022+00:00 Debian Importer Fixing VCID-h5zz-wz8f-2uf6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:08.219506+00:00 Debian Importer Fixing VCID-3tqv-ppue-57fr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:57:23.461962+00:00 Debian Importer Fixing VCID-c8r2-wpf3-47f9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:47:20.191090+00:00 Debian Importer Fixing VCID-3htn-j487-3ydn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:27:14.307725+00:00 Debian Importer Fixing VCID-s8u8-xbdk-87dj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:26.855890+00:00 Debian Importer Fixing VCID-tkcr-ecev-k3af https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:22.856499+00:00 Debian Importer Fixing VCID-qb4j-9tz7-m7a2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:51.349027+00:00 Debian Importer Fixing VCID-usbf-pmfq-1fb6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:14:17.343583+00:00 Debian Importer Fixing VCID-h5zz-wz8f-2uf6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:15.762662+00:00 Debian Importer Fixing VCID-3tqv-ppue-57fr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-09T17:35:00.659032+00:00 Debian Importer Fixing VCID-3htn-j487-3ydn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.631012+00:00 Debian Importer Fixing VCID-usbf-pmfq-1fb6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.603346+00:00 Debian Importer Fixing VCID-3tqv-ppue-57fr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.542540+00:00 Debian Importer Affected by VCID-xhp7-kqdk-tfeu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.508010+00:00 Debian Importer Affected by VCID-un66-k85j-b7d2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.477896+00:00 Debian Importer Affected by VCID-4x92-vapt-n7dz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.445622+00:00 Debian Importer Affected by VCID-8hvk-a5es-v3e4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.414464+00:00 Debian Importer Affected by VCID-vj35-jtgq-8qbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.397911+00:00 Debian Importer Fixing VCID-s8u8-xbdk-87dj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.360885+00:00 Debian Importer Affected by VCID-sd2a-hmu2-wbax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.329568+00:00 Debian Importer Affected by VCID-17pr-6guy-53ge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.313598+00:00 Debian Importer Fixing VCID-h5zz-wz8f-2uf6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.281576+00:00 Debian Importer Fixing VCID-c8r2-wpf3-47f9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.248642+00:00 Debian Importer Fixing VCID-qb4j-9tz7-m7a2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-09T17:35:00.220281+00:00 Debian Importer Fixing VCID-tkcr-ecev-k3af https://security-tracker.debian.org/tracker/data/json 38.1.0