Description
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0499 | angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code. |
Github GHSA |
GHSA-mhp6-pxh8-r675 | Angular vulnerable to Cross-site Scripting |
References
History
Thu, 20 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Angularjs angularjs
|
|
| CPEs | cpe:2.3:a:angularjs:angularjs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Angularjs angular.js
|
Angularjs angularjs
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T09:41:01.655Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7676
No data.
Status : Modified
Published: 2020-06-08T14:15:13.133
Modified: 2025-11-20T18:00:14.787
Link: CVE-2020-7676
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA