CVE-2026-33397

MEDIUM

Angular SSR Vulnerable to Protocol-Relative URL Injection via Single Backslash Bypass

Title source: cna
STIX 2.1

Description

The Angular SSR is a server-rise rendering tool for Angular applications. Versions on the 22.x branch prior to 22.0.0-next.2, the 21.x branch prior to 21.2.3, and the 20.x branch prior to 20.3.21 have an Open Redirect vulnerability in `@angular/ssr` due to an incomplete fix for CVE-2026-27738. While the original fix successfully blocked multiple leading slashes (e.g., `///`), the internal validation logic fails to account for a single backslash (`\`) bypass. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker provides a value starting with a single backslash, the internal validation failed to flag the single backslash as invalid, the application prepends a leading forward slash, resulting in a `Location` header containing the URL, and modern browsers interpret the `/\` sequence as `//`, treating it as a protocol-relative URL and redirecting the user to the attacker-controlled domain. Furthermore, the response lacks the `Vary: X-Forwarded-Prefix` header, allowing the malicious redirect to be stored in intermediate caches (Web Cache Poisoning). Versions 22.0.0-next.2, 21.2.3, and 20.3.21 contain a patch. Until the patch is applied, developers should sanitize the `X-Forwarded-Prefix` header in their `server.ts` before the Angular engine processes the request.

Scores

CVSS v4 6.9
EPSS 0.0006
EPSS Percentile 17.2%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-601
Status published
Products (4)
angular/angular-cli >= 20.0.0-next.0, < 20.3.21
angular/angular-cli >= 21.0.0-next.0, < 21.2.3
angular/angular-cli >= 22.0.0-next.0, < 22.0.0-next.2
angular/ssr 22.0.0-next.0 - 22.0.0-next.2npm
Published Mar 26, 2026
Tracked Since Mar 26, 2026