Changeflow GovPing Data Privacy & Cybersecurity Angular XSS Vulnerability Advisory
Priority review Notice Added Final

Angular XSS Vulnerability Advisory

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 15th, 2026
Detected March 16th, 2026
Email

Summary

CERT-Bund has issued a security advisory for Angular, detailing a Cross-Site Scripting (XSS) vulnerability with a CVSS score of 8.0. The advisory affects specific versions of open-source Angular and provides mitigation information.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0728) concerning a critical Cross-Site Scripting (XSS) vulnerability in Angular, a popular front-end web application framework. The vulnerability, assigned a CVSS Base Score of 8.0, allows remote, authenticated attackers to perform XSS attacks. The advisory specifically impacts open-source Angular versions prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20.

Developers and organizations utilizing affected Angular versions should immediately review the advisory and apply the recommended mitigations or update to patched versions to prevent potential exploitation. Failure to address this vulnerability could lead to compromised user sessions, data theft, or other malicious activities on affected web applications. The advisory also notes that the vulnerability is present across various operating systems including Linux, UNIX, and Windows.

What to do next

  1. Review Angular security advisory WID-SEC-2026-0728
  2. Update affected Angular versions to patched releases
  3. Implement recommended mitigation strategies

Source document (simplified)

[WID-SEC-2026-0728] Angular: Schwachstelle ermöglicht Cross-Site Scripting CVSS Base Score 8.0 (hoch) CVSS Temporal Score 7.0 (hoch) Remoteangriff ja Datum 15.03.2026 Stand 16.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Angular ist ein TypeScript-basiertes Front-End-Webapplikationsframework. Es ist eine Weiterentwicklung des JavaScript basierten AngularJS.

Produkte

15.03.2026
- Open Source Angular <22.0.0-next.3

  • Open Source Angular <21.2.4

  • Open Source Angular <20.3.18

  • Open Source Angular <19.2.20

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Angular ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 15th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies
Geographic scope
de

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Web Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.