CVE-2025-66648

NameCVE-2025-66648
Descriptionvega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1125185

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
vega.js (PTS)bookworm5.22.1+ds+~3.1.0-4vulnerable
forky, trixie5.28.0+ds+~cs5.3.0-1vulnerable
sid5.28.0+ds+~cs5.3.0-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
vega.jssource(unstable)(unfixed)1125185

Notes

https://github.com/vega/vega/security/advisories/GHSA-m9rg-mr6g-75gm

Search for package or bug name: Reporting problems