Home

Description

TeleJSON prior to 6.0.0 contains a DOM-based cross-site scripting vulnerability in the parse() function that allows attackers to execute arbitrary JavaScript by delivering a crafted JSON payload containing a malicious _constructor-name_ property value. The custom reviver passes the constructor name directly to new Function() without sanitization when recreating object prototypes, enabling attackers to inject arbitrary JavaScript through vectors such as postMessage in cross-frame communication contexts to achieve script execution within the application.

PUBLISHED Reserved 2026-05-18 | Published 2026-05-20 | Updated 2026-05-20 | Assigner VulnCheck




LOW: 2.1CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
affected

Any version before 6.0.0
affected

Credits

Niccolò Parlanti finder

References

github.com/...lejson/security/advisories/GHSA-ccgf-5rwj-j3hv vendor-advisory patch

www.vulncheck.com/...lejson-dom-based-xss-via-parse-function third-party-advisory

cve.org (CVE-2026-47099)

nvd.nist.gov (CVE-2026-47099)

Download JSON