Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-32635

Опубликовано: 13 мар. 2026
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

A Cross-Site Scripting (XSS) vulnerability has been identified in the Angular runtime and compiler. It occurs when the application uses a security-sensitive attribute (for example href on an anchor tag) together with Angular's ability to internationalize attributes. Enabling internationalization for the sensitive attribute by adding i18n- name bypasses Angular's built-in sanitization mechanism, which when combined with a data binding to untrusted user-generated data can allow an attacker to inject a malicious script.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10cephAffected
Red Hat Enterprise Linux 10gjsAffected
Red Hat Enterprise Linux 10intel-cmt-catAffected
Red Hat Enterprise Linux 8dotnet5.0-build-reference-packagesAffected
Red Hat Enterprise Linux 8intel-cmt-catAffected
Red Hat Enterprise Linux 8mozjs60Affected
Red Hat Enterprise Linux 9cephAffected
Red Hat Enterprise Linux 9gjsAffected
Red Hat Enterprise Linux 9intel-cmt-catAffected
Red Hat Fuse 7io.apicurio-apicuritoAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=2447515@angular/core: @angular/compiler: Angular has XSS in i18n attribute bindings

EPSS

Процентиль: 15%
0.00049
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

ubuntu
11 дней назад

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, a Cross-Site Scripting (XSS) vulnerability has been identified in the Angular runtime and compiler. It occurs when the application uses a security-sensitive attribute (for example href on an anchor tag) together with Angular's ability to internationalize attributes. Enabling internationalization for the sensitive attribute by adding i18n-<attribute> name bypasses Angular's built-in sanitization mechanism, which when combined with a data binding to untrusted user-generated data can allow an attacker to inject a malicious script. This vulnerability is fixed in 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20.

nvd
11 дней назад

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, a Cross-Site Scripting (XSS) vulnerability has been identified in the Angular runtime and compiler. It occurs when the application uses a security-sensitive attribute (for example href on an anchor tag) together with Angular's ability to internationalize attributes. Enabling internationalization for the sensitive attribute by adding i18n-<attribute> name bypasses Angular's built-in sanitization mechanism, which when combined with a data binding to untrusted user-generated data can allow an attacker to inject a malicious script. This vulnerability is fixed in 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20.

debian
11 дней назад

Angular is a development platform for building mobile and desktop web ...

github
13 дней назад

Angular vulnerable to XSS in i18n attribute bindings

EPSS

Процентиль: 15%
0.00049
Низкий

6.3 Medium

CVSS3