Vega Cross-Site Scripting (XSS) via expressions abusing toString calls in environments using the VEGA_DEBUG global varia (GHSA-7f2v-3qq3-vvjf) 2
- Severity:
- High
Description
Applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if “safe mode” expressionInterpreter is used.
- Use
vegain an application that attachesvegalibrary and avega.Viewinstance similar to the Vega Editor to the globalwindow2.
Recommendation
Update the vega-interpreter package to the latest compatible version. Followings are version details:
Affected version(s): **< 1.2.1 >= 2.0.0, < 2.2.1** Patched version(s): **1.2.1 2.2.1**
References
Related Issues
- Server secret was included in static assets and served to clients - Vulnerability
- Redwood is vulnerable to account takeover via dbAuth "forgot-password - Vulnerability
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- Incorrect default cookie name and recommendation - Vulnerability
- Tags:
- npm
- vega-interpreter
Anything's wrong? Let us know Last updated on November 14, 2025