Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/angular.js@0?distro=trixie
purl pkg:deb/debian/angular.js@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-3mrw-2h7j-zfdv Angular Stored XSS Vulnerability via SVG Animation, SVG URL and MathML Attributes A **Stored Cross-Site Scripting ([XSS](https://angular.dev/best-practices/security#preventing-cross-site-scripting-xss))** vulnerability has been identified in the **Angular Template Compiler**. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain [`javascript:` URLs](https://developer.mozilla.org/en-US/Web/URI/Reference/Schemes/javascript)) as requiring strict URL security, enabling the injection of malicious scripts. Additionally, a related vulnerability exists involving SVG animation elements (`<animate>`, `<set>`, `<animateMotion>`, `<animateTransform>`). The `attributeName` attribute on these elements was not properly validated, allowing attackers to dynamically target security-sensitive attributes like `href` or `xlink:href` on other elements. By binding `attributeName` to "href" and providing a `javascript:` URL in the `values` or `to` attribute, an attacker could bypass sanitization and execute arbitrary code. Attributes confirmed to be vulnerable include: * SVG-related attributes: (e.g., `xlink:href`), and various MathML attributes (e.g., `math|href`, `annotation|href`). * SVG animation `attributeName` attribute when bound to "href" or "xlink:href". When template binding is used to assign untrusted, user-controlled data to these attributes (e.g., `[attr.xlink:href]="maliciousURL"` or `<animate [attributeName]="'href'" [values]="maliciousURL">`), the compiler incorrectly falls back to a non-sanitizing context or fails to block the dangerous attribute assignment. This allows an attacker to inject a `javascript:URL` payload. Upon user interaction (like a click) on the element, or automatically in the case of animations, the malicious JavaScript executes in the context of the application's origin. CVE-2025-66412
GHSA-v4hv-rgfq-gp49
VCID-ms76-c5dn-23hx Angular has XSS Vulnerability via Unsanitized SVG Script Attributes A Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. The vulnerability exists because Angular’s internal sanitization schema fails to recognize the `href` and `xlink:href` attributes of SVG `<script>` elements as a **Resource URL** context. In a standard security model, attributes that can load and execute code (like a script's source) should be strictly validated. However, because the compiler does not classify these specific SVG attributes correctly, it allows attackers to bypass Angular's built-in security protections. When template binding is used to assign user-controlled data to these attributes for example, `<script [attr.href]="userInput">` the compiler treats the value as a standard string or a non-sensitive URL rather than a resource link. This enables an attacker to provide a malicious payload, such as a `data:text/javascript` URI or a link to an external malicious script. ### Impact When successfully exploited, this vulnerability allows for **arbitrary JavaScript execution** within the context of the victim's browser session. This can lead to: - **Session Hijacking:** Stealing session cookies, localStorage data, or authentication tokens. - **Data Exfiltration:** Accessing and transmitting sensitive information displayed within the application. - **Unauthorized Actions:** Performing state-changing actions (like clicking buttons or submitting forms) on behalf of the authenticated user. ### Attack Preconditions 1. The victim application must explicitly use SVG `<script>` elements within its templates. 2. The application must use property or attribute binding (interpolation) for the `href` or `xlink:href` attributes of those SVG scripts. 3. The data bound to these attributes must be derived from an untrusted source (e.g., URL parameters, user-submitted database entries, or unsanitized API responses). ### Patches - 19.2.18 - 20.3.16 - 21.0.7 - 21.1.0-rc.0 ### Workarounds Until the patch is applied, developers should: - **Avoid Dynamic Bindings**: Do not use Angular template binding (e.g., `[attr.href]`) for SVG `<script>` elements. - **Input Validation**: If dynamic values must be used, strictly validate the input against a strict allowlist of trusted URLs on the server side or before it reaches the template. ### Resources - https://github.com/angular/angular/pull/66318 CVE-2026-22610
GHSA-jrmj-c5cx-3cw6
VCID-x8wa-kpm3-abh9 Angular is Vulnerable to XSRF Token Leakage via Protocol-Relative URLs in Angular HTTP Client The vulnerability is a **Credential Leak by App Logic** that leads to the **unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token** to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (`http://` or `https://`) to determine if it is cross-origin. If the URL starts with protocol-relative URL (`//`), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the `X-XSRF-TOKEN` header. CVE-2025-66035
GHSA-58c5-g7wp-6w37

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:02:50.114526+00:00 Debian Importer Fixing VCID-3mrw-2h7j-zfdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:51.371300+00:00 Debian Importer Fixing VCID-x8wa-kpm3-abh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:03:26.231884+00:00 Debian Importer Fixing VCID-ms76-c5dn-23hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T07:30:01.950713+00:00 Debian Importer Fixing VCID-3mrw-2h7j-zfdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:43.901627+00:00 Debian Importer Fixing VCID-x8wa-kpm3-abh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:04:19.427613+00:00 Debian Importer Fixing VCID-ms76-c5dn-23hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:10:11.696706+00:00 Debian Importer Fixing VCID-3mrw-2h7j-zfdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:07.979380+00:00 Debian Importer Fixing VCID-x8wa-kpm3-abh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:40.559919+00:00 Debian Importer Fixing VCID-ms76-c5dn-23hx https://security-tracker.debian.org/tracker/data/json 38.1.0