Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/CyberSecurity News/New Angular Vulnerability Allows Malicious Code Execution
CyberSecurity News

New Angular Vulnerability Allows Malicious Code Execution

A critical Cross-Site Scripting (XSS) vulnerability has been identified within Angular’s Template Compiler. This flaw affects multiple versions of both the @angular/compiler and @angular/core...

Jennifer sherman
Jennifer sherman
January 13, 2026 2 Min Read
2 0

A critical Cross-Site Scripting (XSS) vulnerability has been identified within Angular’s Template Compiler. This flaw affects multiple versions of both the @angular/compiler and @angular/core packages.

Tracked as CVE-2026-22610, this vulnerability allows attackers to bypass Angular’s built-in security protections and execute arbitrary JavaScript code within victim browsers.

The Vulnerability

The flaw exists in Angular’s internal sanitization schema, which fails to properly recognize the href and xlink:href attributes of SVG <script> elements as resource URLs requiring strict validation.

This oversight enables attackers to inject malicious payloads via template bindings, thereby executing unauthorized code in users’ sessions.

Field Details
CVE ID CVE-2026-22610
Vulnerability Type Cross-Site Scripting (XSS)
CWE CWE-79: Improper Neutralization of Input During Web Page Generation
CVSS v4 Score 7.6 (High)
CVSS Vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

When developers use Angular’s property binding syntax (such as [attr.href]=”userInput”), the compiler treats these SVG script attributes as standard strings rather than dangerous resource links.

This misclassification allows malicious data, including data: text/javascript URIs or links to external malicious scripts, to bypass security checks. Successful exploitation of this vulnerability can lead to severe consequences.

Attackers may steal session cookies, localStorage data, or authentication tokens to hijack user accounts.

They could also exfiltrate sensitive information displayed within applications or perform unauthorized actions on behalf of authenticated users.

The vulnerability carries a CVSS v4 base score of 7.6 (High severity). It requires low attack complexity and relatively low privilege levels to exploit.

Affected Versions and Fixed Versions

Angular Package Affected Versions Fixed / Safe Versions
@angular/compiler, @angular/core ≥ 21.1.0-next.0 and < 21.1.0-rc.0 21.1.0-rc.0 or later
@angular/compiler, @angular/core ≥ 21.0.0-next.0 and < 21.0.7 21.0.7 or later
@angular/compiler, @angular/core ≥ 20.0.0-next.0 and < 20.3.16 20.3.16 or later
@angular/compiler, @angular/core ≥ 19.0.0-next.0 and < 19.2.18 19.2.18 or later
@angular/compiler, @angular/core ≤ 18.2.14 No patch available — upgrade required

Exploitation requires specific conditions: the target application must use SVG <script> elements in templates with dynamic property or attribute bindings for href or xlink:href attributes, and the bound data must originate from untrusted sources.

According to GitHub advisory, developers should immediately update Angular to patched versions.

Until patches are applied, avoid using dynamic bindings with SVG script elements and implement strict server-side input validation for any dynamic URL values before they reach templates.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

CISA: Gogs Path Traversal Vulnerability Actively Warns Exploited

Next Post

Critical ServiceNow Flaw: Unauthenticated Privilege Escalation

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us