I would like to know if the new version 7.7 of Ext JS has resolved the issue of vulnerabilities with CSP headers. Specifically, I would like to know if "unsafe-eval" content security policy has been corrected
I have tried version 7.5 and the problem with "unsafe-eval" CSP still occurs.
No, even 7.7 version is not strict CSP compatible. Why? because it uses 'eval' to parse template strings.
However you can read the official Sencha statement on the same - https://docs.sencha.com/extjs/7.7.0/guides/other_resources/use_eval_func.html