Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pw8r-6689-xvf4 | Angular Expressions - Remote Code Execution using filters |
Wed, 13 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:peerigon:angular-expressions:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
Mon, 11 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Peerigon
Peerigon angular-expressions |
|
| Vendors & Products |
Peerigon
Peerigon angular-expressions |
|
| Metrics |
ssvc
|
Mon, 11 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to 1.5.2, an attacker can write a malicious expression using filters that escapes the sandbox to execute arbitrary code on the system. This vulnerability is fixed in 1.5.2. | |
| Title | Angular Expressions - Remote Code Execution using filters | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T16:22:58.556Z
Reserved: 2026-05-07T15:30:10.875Z
Link: CVE-2026-44643
Updated: 2026-05-11T16:22:53.227Z
Status : Analyzed
Published: 2026-05-11T16:17:36.143
Modified: 2026-05-13T14:54:54.340
Link: CVE-2026-44643
No data.
OpenCVE Enrichment
Updated: 2026-05-11T17:15:40Z
Github GHSA