Skip to main content

CVE-2025-2336: CWE-791: Incomplete Filtering of Special Elements in Google AngularJS

Medium
VulnerabilityCVE-2025-2336cvecve-2025-2336cwe-791
Published: Wed Jun 04 2025 (06/04/2025, 16:32:31 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: AngularJS

Description

Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS's 'ngSanitize' module allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects AngularJS versions greater than or equal to 1.3.1. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

AI-Powered Analysis

AILast updated: 07/06/2025, 11:11:08 UTC

Technical Analysis

CVE-2025-2336 is a medium-severity vulnerability affecting Google AngularJS versions 1.3.1 and above, specifically within the 'ngSanitize' module responsible for sanitizing HTML content. The vulnerability arises due to improper sanitization of the 'href' and 'xlink:href' attributes in '<image>' SVG elements. Attackers can exploit this flaw to bypass common image source restrictions, enabling them to inject malicious or unexpected image URLs. This can lead to content spoofing attacks, where an attacker manipulates the visual content of a web application to mislead users or impersonate legitimate content. Additionally, the injection of large or slow-loading images can degrade application performance and disrupt normal behavior. Notably, AngularJS is an end-of-life project, meaning no official patches or updates will be released to address this vulnerability. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based but requires high attack complexity, no privileges, and no user interaction. The impact affects integrity and availability but not confidentiality. No known exploits are currently reported in the wild. Given AngularJS's widespread historical use in web applications, especially legacy systems, this vulnerability poses a risk primarily to organizations still relying on AngularJS for frontend development without migration to supported frameworks.

Potential Impact

For European organizations, the vulnerability could lead to content spoofing attacks that undermine user trust and brand reputation, especially for sectors with high web presence such as e-commerce, finance, and government services. The ability to inject malicious image sources can also be leveraged for phishing or social engineering campaigns targeting European users. Performance degradation caused by large or slow-loading images can affect user experience and availability of critical web applications. Since AngularJS is no longer maintained, organizations using it face increased risk due to the absence of official patches, making mitigation more challenging. This is particularly concerning for legacy systems in regulated industries (e.g., banking, healthcare) where integrity and availability are critical. The medium CVSS score indicates moderate risk, but the lack of ongoing support elevates the threat over time as attackers may develop exploits. European organizations with public-facing AngularJS applications should assess exposure and consider the reputational and operational impacts of potential exploitation.

Mitigation Recommendations

Given the end-of-life status of AngularJS and the absence of official patches, European organizations should prioritize migration away from AngularJS to modern, supported frameworks such as Angular (2+), React, or Vue.js. For systems where immediate migration is not feasible, implement strict Content Security Policies (CSP) to restrict allowed image sources and prevent loading of untrusted content. Additionally, sanitize and validate all user inputs and external content at the server side to complement client-side protections. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SVG image payloads or unusual 'href' attribute patterns. Regularly audit and monitor web application behavior for anomalies related to image loading and performance degradation. Finally, educate development teams about the risks of using deprecated frameworks and the importance of timely upgrades to reduce exposure to unpatched vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HeroDevs
Date Reserved
2025-03-15T11:48:06.541Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684077df182aa0cae2b5fa4f

Added to database: 6/4/2025, 4:44:15 PM

Last enriched: 7/6/2025, 11:11:08 AM

Last updated: 7/30/2025, 9:57:04 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats