Changeflow GovPing Data Privacy & Cybersecurity Angular Security Flaw Enables Remote Informatio...
Priority review Notice Added Final

Angular Security Flaw Enables Remote Information Disclosure

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued a security advisory warning of a vulnerability in Angular framework versions prior to 19.2.21, 20.3.19, 21.2.9, and 22.0.0-next.8. A remote, anonymous attacker can exploit this flaw to disclose information. The vulnerability affects applications running on Angular across Linux, UNIX, Windows, and other operating systems, with a CVSS Base Score of 8.6 (high) and Temporal Score of 7.5 (high).

Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-Bund published a security advisory regarding a high-severity information disclosure vulnerability in Angular framework. Affected versions include those prior to 19.2.21, 20.3.19, 21.2.9, and 22.0.0-next.8. The vulnerability allows remote anonymous attackers to exploit the framework to expose information.\n\nOrganizations using Angular applications on Linux, UNIX, Windows, or other operating systems should review their implementations and apply available mitigations. The CVSS Base Score of 8.6 indicates significant risk requiring prompt attention from IT security teams and software developers.

Archived snapshot

Apr 17, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1162] Angular: Schwachstelle ermöglicht Offenlegung von Informationen CVSS Base Score 8.6 (hoch) CVSS Temporal Score 7.5 (hoch) Remoteangriff ja Datum 16.04.2026 Stand 17.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Angular ist ein TypeScript-basiertes Front-End-Webapplikationsframework. Es ist eine Weiterentwicklung des JavaScript basierten AngularJS.

Produkte

16.04.2026
- Open Source Angular <22.0.0-next.8

  • Open Source Angular <21.2.9

  • Open Source Angular <20.3.19

  • Open Source Angular <19.2.21

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Angular ausnutzen, um Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 16th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1162

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Software vulnerability assessment Security patching
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software & Technology

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!