CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-66648
7.2

Vega's Visual Betrayal: Leaking the Window via Internal Functions

Alon Barad
Alon Barad
Software Engineer

Jan 6, 2026·7 min read·15 visits

PoC Available

Executive Summary (TL;DR)

Vega, the popular visualization grammar, failed to sanitize inputs to its internal `modify()` function. Attackers can craft a malicious JSON specification that traverses internal object references (via `event.dataflow`) to reach the browser's global scope (`window`). By passing a function reference like `window.alert` into `modify()`, the engine unwittingly executes it. Fixed in `vega-functions` 6.1.1.

A high-severity Cross-Site Scripting (XSS) vulnerability exists in the Vega expression language (`vega-functions`). By leveraging the internal `modify` function and traversing the `dataflow` object graph, attackers can access the global `window` object and execute arbitrary JavaScript.

Official Patches

VegaCommit fixing the vulnerability in modify.js

Fix Analysis (1)

Technical Appendix

CVSS Score
7.2/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Affected Systems

vega-functions < 6.1.1Vega visualization libraryApplications embedding Vega (e.g., Kibana, Jupyter)

Affected Versions Detail

Product
Affected Versions
Fixed Version
vega-functions
Vega
< 6.1.16.1.1
AttributeDetail
CWE IDCWE-79
Attack VectorNetwork
CVSS Score7.2 (High)
Exploit StatusPoC Available
ImpactCode Execution / XSS
Vulnerability TypeImproper Input Neutralization

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059.007Command and Scripting Interpreter: JavaScript
Execution
CWE-79
Cross-site Scripting

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Known Exploits & Detection

GitHub Security AdvisoryAdvisory containing PoC for modify() function exploitation

Vulnerability Timeline

Fix committed to Vega repository
2025-12-05
Public disclosure of CVE-2025-66648
2026-01-05
GHSA Advisory published
2026-01-05

References & Sources

  • [1]GHSA-m9rg-mr6g-75gm
  • [2]Vega Expressions Documentation

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.