๐Ÿ” CVE Alert

CVE-2026-8656

MEDIUM 6.1
CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th

Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Cross-site Scripting (XSS) via the annotated formatter due to improper sanitization of JSON values and property names. If an application compares untrusted JSON/object data and renders annotated formatter output in the DOM, attacker-controlled HTML can be interpreted by the browser, resulting in XSS.

CWE CWE-79
Vendor n/a
Product jsondiffpatch
Published May 16, 2026
Stay Ahead of the Next One

Get instant alerts for n/a jsondiffpatch

Be the first to know when new medium vulnerabilities affecting n/a jsondiffpatch are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

n/a / jsondiffpatch
0 < 0.7.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
security.snyk.io: https://security.snyk.io/vuln/SNYK-JS-JSONDIFFPATCH-16635946 gist.github.com: https://gist.github.com/yuki-matsuhashi/72ed072d919f3c52adba298faa6a7da5 github.com: https://github.com/benjamine/jsondiffpatch/commit/232338b34c4653148ca2f44e897a765b72c8c98f

Credits

Yuki Matsuhashi