CVE-2026-47099 PUBLISHED

TeleJSON < 6.0.0 DOM-based XSS via parse() Function

Assigner: VulnCheck
Reserved: 18.05.2026 Published: 20.05.2026 Updated: 21.05.2026

TeleJSON prior to 6.0.0 contains a DOM-based cross-site scripting vulnerability in the parse() function that allows attackers to execute arbitrary JavaScript by delivering a crafted JSON payload containing a malicious constructor-name property value. The custom reviver passes the constructor name directly to new Function() without sanitization when recreating object prototypes, enabling attackers to inject arbitrary JavaScript through vectors such as postMessage in cross-frame communication contexts to achieve script execution within the application.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
CVSS Score: 2.1

Product Status

Vendor storybookjs
Product telejson
Versions Default: affected
  • affected from 0 to 6.0.0 (excl.)

Credits

  • Niccolò Parlanti finder

References

Problem Types

  • Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE