Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vfx2-hv2g-xj5f | Protocol-Relative URL Injection via Single Backslash Bypass in Angular SSR |
Thu, 30 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Angular angular Cli
|
|
| CPEs | cpe:2.3:a:angular:angular_cli:*:-:*:*:*:node.js:*:* cpe:2.3:a:angular:angular_cli:22.0.0:next0:*:*:*:node.js:*:* cpe:2.3:a:angular:angular_cli:22.0.0:next1:*:*:*:node.js:*:* |
|
| Vendors & Products |
Angular angular Cli
|
|
| Metrics |
cvssV3_1
|
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Angular
Angular angular |
|
| Vendors & Products |
Angular
Angular angular |
Thu, 26 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Angular SSR is a server-rise rendering tool for Angular applications. Versions on the 22.x branch prior to 22.0.0-next.2, the 21.x branch prior to 21.2.3, and the 20.x branch prior to 20.3.21 have an Open Redirect vulnerability in `@angular/ssr` due to an incomplete fix for CVE-2026-27738. While the original fix successfully blocked multiple leading slashes (e.g., `///`), the internal validation logic fails to account for a single backslash (`\`) bypass. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker provides a value starting with a single backslash, the internal validation failed to flag the single backslash as invalid, the application prepends a leading forward slash, resulting in a `Location` header containing the URL, and modern browsers interpret the `/\` sequence as `//`, treating it as a protocol-relative URL and redirecting the user to the attacker-controlled domain. Furthermore, the response lacks the `Vary: X-Forwarded-Prefix` header, allowing the malicious redirect to be stored in intermediate caches (Web Cache Poisoning). Versions 22.0.0-next.2, 21.2.3, and 20.3.21 contain a patch. Until the patch is applied, developers should sanitize the `X-Forwarded-Prefix` header in their `server.ts` before the Angular engine processes the request. | |
| Title | Angular SSR Vulnerable to Protocol-Relative URL Injection via Single Backslash Bypass | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T14:56:05.822Z
Reserved: 2026-03-19T17:02:34.169Z
Link: CVE-2026-33397
Updated: 2026-03-30T13:54:27.266Z
Status : Analyzed
Published: 2026-03-26T15:16:38.533
Modified: 2026-04-30T16:51:51.770
Link: CVE-2026-33397
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:26:41Z
Github GHSA