High severityOSV Advisory· Published Jan 5, 2026· Updated Jan 6, 2026
`vega-functions` vulnerable to Cross-site Scripting via `setdata` function
CVE-2025-66648
Description
vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions 6.1.1. There is no workaround besides upgrading. Using vega.expressionInterpreter as described in CSP safe mode does not prevent this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vega-functionsnpm | < 6.1.1 | 6.1.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-m9rg-mr6g-75gmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-66648ghsaADVISORY
- github.com/vega/vega/security/advisories/GHSA-m9rg-mr6g-75gmghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.