TeleJSON prior to 6.0.0 contains a DOM-based cross-site scripting vulnerability in the parse() function that allows attackers to execute arbitrary JavaScript by delivering a crafted JSON payload containing a malicious _constructor-name_ property value. The custom reviver passes the constructor name directly to new Function() without sanitization when recreating object prototypes, enabling attackers to inject arbitrary JavaScript through vectors such as postMessage in cross-frame communication contexts to achieve script execution within the application.
Metrics
Affected Vendors & Products
References
History
Thu, 21 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 21 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Storybookjs
Storybookjs telejson |
|
| Vendors & Products |
Storybookjs
Storybookjs telejson |
Wed, 20 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TeleJSON prior to 6.0.0 contains a DOM-based cross-site scripting vulnerability in the parse() function that allows attackers to execute arbitrary JavaScript by delivering a crafted JSON payload containing a malicious _constructor-name_ property value. The custom reviver passes the constructor name directly to new Function() without sanitization when recreating object prototypes, enabling attackers to inject arbitrary JavaScript through vectors such as postMessage in cross-frame communication contexts to achieve script execution within the application. | |
| Title | TeleJSON < 6.0.0 DOM-based XSS via parse() Function | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-05-20T18:00:44.637Z
Updated: 2026-05-20T19:28:13.563Z
Reserved: 2026-05-18T19:22:26.747Z
Link: CVE-2026-47099
Updated: 2026-05-20T19:28:09.577Z
Status : Received
Published: 2026-05-20T20:16:41.063
Modified: 2026-05-20T20:16:41.063
Link: CVE-2026-47099