Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ccgf-5rwj-j3hv | TeleJSON: DOM XSS via unsanitised constructor name in `new Function()` |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TeleJSON prior to 6.0.0 contains a DOM-based cross-site scripting vulnerability in the parse() function that allows attackers to execute arbitrary JavaScript by delivering a crafted JSON payload containing a malicious _constructor-name_ property value. The custom reviver passes the constructor name directly to new Function() without sanitization when recreating object prototypes, enabling attackers to inject arbitrary JavaScript through vectors such as postMessage in cross-frame communication contexts to achieve script execution within the application. | |
| Title | TeleJSON < 6.0.0 DOM-based XSS via parse() Function | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-20T19:28:13.563Z
Reserved: 2026-05-18T19:22:26.747Z
Link: CVE-2026-47099
Updated: 2026-05-20T19:28:09.577Z
Status : Received
Published: 2026-05-20T20:16:41.063
Modified: 2026-05-20T20:16:41.063
Link: CVE-2026-47099
No data.
OpenCVE Enrichment
No data.
Github GHSA