CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-65110
8.10.04%

Chart of Doom: Hijacking Vega's .map() for DOM XSS

Alon Barad
Alon Barad
Software Engineer

Jan 6, 2026·7 min read·5 visits

PoC Available

Executive Summary (TL;DR)

Vega blindly trusts that an input is an Array before calling `.map()` on it. Attackers can pass a malicious object instead, hijacking the method call to trigger 'gadgets' like `CanvasHandler.prototype.on`. In environments where debug globals are exposed, this chains directly into `eval()`, turning your innocent bar chart into a remote shell.

A high-severity DOM-based Cross-Site Scripting (XSS) vulnerability in the Vega visualization library. By exploiting a type confusion flaw in the `vega-selections` package, attackers can perform method hijacking to execute arbitrary JavaScript code via crafted JSON specifications.

Official Patches

Vega GitHubPull request fixing the vulnerability in vega-selections

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
EPSS Probability
0.04%
Top 100% most exploited

Affected Systems

Vega visualization library (v5 and v6)Applications rendering user-supplied Vega JSONJupyter Notebook environments using Altair/VegaKibana (if using older Vega plugins)

Affected Versions Detail

Product
Affected Versions
Fixed Version
vega-selections
vega
< 5.6.35.6.3
vega-selections
vega
>= 6.0.0, < 6.1.26.1.2
AttributeDetail
CWE IDCWE-79
Attack VectorNetwork (DOM-based)
CVSS v3.18.1 (High)
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Exploit StatusPoC Available
Patch Date2026-01-05

MITRE ATT&CK Mapping

T1059.007Command and Scripting Interpreter: JavaScript
Execution
T1204.001User Execution: Malicious Link
Execution
CWE-79
Cross-site Scripting

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Known Exploits & Detection

GitHub AdvisoryOfficial advisory containing the PoC payload

Vulnerability Timeline

CVE Published
2026-01-05
Patch Released
2026-01-05
Advisory GHSA-829q-m3qg-ph8r Released
2026-01-05

References & Sources

  • [1]GHSA-829q-m3qg-ph8r
  • [2]Vega Documentation

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.