Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m9rg-mr6g-75gm | `vega-functions` vulnerable to Cross-site Scripting via `setdata` function |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 06 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vega Project
Vega Project vega-functions |
|
| Vendors & Products |
Vega Project
Vega Project vega-functions |
Tue, 06 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 05 Jan 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | vega-functions provides function implementations for the Vega expression language. Prior to version 6.1.1, for sites that allow users to supply untrusted user input, malicious use of an internal function (not part of the public API) could be used to run unintentional javascript (XSS). This issue is fixed in vega-functions `6.1.1`. There is no workaround besides upgrading. Using `vega.expressionInterpreter` as described in CSP safe mode does not prevent this issue. | |
| Title | `vega-functions` vulnerable to Cross-site Scripting via `setdata` function | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-06T15:40:18.443Z
Reserved: 2025-12-05T20:23:19.596Z
Link: CVE-2025-66648
Updated: 2026-01-06T15:40:11.468Z
Status : Received
Published: 2026-01-05T22:15:51.400
Modified: 2026-01-05T22:15:51.400
Link: CVE-2025-66648
OpenCVE Enrichment
Updated: 2026-01-06T14:16:38Z
Github GHSA