Home

Description

vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue.

PUBLISHED Reserved 2025-12-05 | Published 2026-01-05 | Updated 2026-01-06 | Assigner GitHub_M




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 6.1.1
affected

References

github.com/vega/vega/security/advisories/GHSA-m9rg-mr6g-75gm

cve.org (CVE-2025-66648)

nvd.nist.gov (CVE-2025-66648)

Download JSON