CVE-2025-69993

NameCVE-2025-69993
DescriptionLeaflet versions up to and including 1.9.4 are vulnerable to Cross-Site Scripting (XSS) via the bindPopup() method. This method renders user-supplied input as raw HTML without sanitization, allowing attackers to inject arbitrary JavaScript code through event handler attributes (e.g., <img src=x onerror="alert('XSS')">). When a victim views an affected map popup, the malicious script executes in the context of the victim's browser session.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
leaflet (PTS)bullseye1.7.1~dfsg-2vulnerable
forky, sid, bookworm, trixie1.7.1~dfsg-7vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
leafletsource(unstable)(unfixed)

Notes

https://github.com/PierfrancescoConti/leaflet-cve-2025-69993/blob/main/ADVISORY.md

Search for package or bug name: Reporting problems