Angular XSS Vulnerability Advisory
Summary
CERT-Bund has issued a security advisory for Angular, detailing a Cross-Site Scripting (XSS) vulnerability with a CVSS score of 8.0. The advisory affects specific versions of open-source Angular and provides mitigation information.
What changed
CERT-Bund has released a security advisory (WID-SEC-2026-0728) concerning a critical Cross-Site Scripting (XSS) vulnerability in Angular, a popular front-end web application framework. The vulnerability, assigned a CVSS Base Score of 8.0, allows remote, authenticated attackers to perform XSS attacks. The advisory specifically impacts open-source Angular versions prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20.
Developers and organizations utilizing affected Angular versions should immediately review the advisory and apply the recommended mitigations or update to patched versions to prevent potential exploitation. Failure to address this vulnerability could lead to compromised user sessions, data theft, or other malicious activities on affected web applications. The advisory also notes that the vulnerability is present across various operating systems including Linux, UNIX, and Windows.
What to do next
- Review Angular security advisory WID-SEC-2026-0728
- Update affected Angular versions to patched releases
- Implement recommended mitigation strategies
Source document (simplified)
[WID-SEC-2026-0728] Angular: Schwachstelle ermöglicht Cross-Site Scripting CVSS Base Score 8.0 (hoch) CVSS Temporal Score 7.0 (hoch) Remoteangriff ja Datum 15.03.2026 Stand 16.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Angular ist ein TypeScript-basiertes Front-End-Webapplikationsframework. Es ist eine Weiterentwicklung des JavaScript basierten AngularJS.
Produkte
15.03.2026
- Open Source Angular <22.0.0-next.3
Open Source Angular <21.2.4
Open Source Angular <20.3.18
Open Source Angular <19.2.20
Angriff
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Angular ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.