Vulnerability Description
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. Prior to version 5.26.0 of vega and 5.4.2 of vega-selections, the `vlSelectionTuples` function can be used to call JavaScript functions, leading to cross-site scripting.`vlSelectionTuples` calls multiple functions that can be controlled by an attacker, including one call with an attacker-controlled argument. This can be used to call `Function()` with arbitrary JavaScript and the resulting function can be called with `vlSelectionTuples` or using a type coercion to call `toString` or `valueOf`. Version 5.26.0 of vega and 5.4.2 of vega-selections fix this issue.
Related Weaknesses (CWE)
References
- https://github.com/vega/vega/blob/b45cf431cd6c0d0c0e1567f087f9b3b55bc236fa/packa
- https://github.com/vega/vega/commit/9fb9ea07e27984394e463d286eb73944fa61411e
- https://github.com/vega/vega/security/advisories/GHSA-mp7w-mhcv-673j
FAQ
What is CVE-2025-25304?
CVE-2025-25304 is a documented vulnerability. Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. Prior to version 5.26.0 of vega and 5.4.2 of vega-selections, the `vlSelectio...
How severe is CVE-2025-25304?
CVSS scoring is not yet available for CVE-2025-25304. Check NVD for updates.
Is there a patch for CVE-2025-25304?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.