CVE-2025-66648

vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:vega-functions_project:vega-functions:*:*:*:*:*:node.js:*:*

History

05 Feb 2026, 21:27

Type Values Removed Values Added
References () https://github.com/vega/vega/security/advisories/GHSA-m9rg-mr6g-75gm - () https://github.com/vega/vega/security/advisories/GHSA-m9rg-mr6g-75gm - Exploit, Vendor Advisory
First Time Vega-functions Project vega-functions
Vega-functions Project
CPE cpe:2.3:a:vega-functions_project:vega-functions:*:*:*:*:*:node.js:*:*

05 Jan 2026, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-05 22:15

Updated : 2026-02-05 21:27


NVD link : CVE-2025-66648

Mitre link : CVE-2025-66648

CVE.ORG link : CVE-2025-66648


JSON object : View

Products Affected

vega-functions_project

  • vega-functions
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')