Vega Cross-Site Scripting (XSS) via expressions abusing toString calls in environments using the VEGA_DEBUG global varia
- Severity:
- High
Description
Applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if “safe mode” expressionInterpreter is used.
- Use
vegain an application that attachesvegalibrary and avega.Viewinstance similar to the Vega Editor to the globalwindow2.
Recommendation
Update the vega package to the latest compatible version. Followings are version details:
- Affected version(s): < 6.2.0
- Patched version(s): 6.2.0
References
Related Issues
- Parse Server allows public `explain` queries which may expose sensitive database performance information and schema deta - CVE-2025-64502
- Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability (GHSA-m5vv-6r4h-3vj9) - CVE-2024-35255
- tiny-secp256k1 vulnerable to private key extraction when signing a malicious JSON-stringifyable message in bundled envir - CVE-2024-49364
- Vega Cross-Site Scripting (XSS) via event filter when not using CSP mode expressionInterpeter (GHSA-rcw3-wmx7-cphr) - CVE-2025-26619
- Tags:
- npm
- vega
Anything's wrong? Let us know Last updated on November 14, 2025