It completely depends on a) whether you clear JSON on the server side and (even more) on b) how you decode JSON on the client side when reloading.
Any code that uses eval()JSON to deserialize Javascript is open specifically for your attack.
Any code that uses JSONP to load JSON (i.e. passing JSON as a Javascript literal for the specified callback function) is open to the attack you describe (it is actually the same as when using it eval()).
JSON- (, json2.js, jQuery $.parseJSON JSON.parse() , ) JSON, JSON. , JSON, .
, JSON , , . , , JSON (, json.loads(user_submitted_json) Python ).
, , , .