Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62427: CWE-918: Server-Side Request Forgery (SSRF) in angular angular-cli

0
High
VulnerabilityCVE-2025-62427cvecve-2025-62427cwe-918
Published: Thu Oct 16 2025 (10/16/2025, 18:50:11 UTC)
Source: CVE Database V5
Vendor/Project: angular
Product: angular-cli

Description

The Angular SSR is a server-rise rendering tool for Angular applications. The vulnerability is a Server-Side Request Forgery (SSRF) flaw within the URL resolution mechanism of Angular's Server-Side Rendering package (@angular/ssr) before 19.2.18, 20.3.6, and 21.0.0-next.8. The function createRequestUrl uses the native URL constructor. When an incoming request path (e.g., originalUrl or url) begins with a double forward slash (//) or backslash (\\), the URL constructor treats it as a schema-relative URL. This behavior overrides the security-intended base URL (protocol, host, and port) supplied as the second argument, instead resolving the URL against the scheme of the base URL but adopting the attacker-controlled hostname. This allows an attacker to specify an external domain in the URL path, tricking the Angular SSR environment into setting the page's virtual location (accessible via DOCUMENT or PlatformLocation tokens) to this attacker-controlled domain. Any subsequent relative HTTP requests made during the SSR process (e.g., using HttpClient.get('assets/data.json')) will be incorrectly resolved against the attacker's domain, forcing the server to communicate with an arbitrary external endpoint. This vulnerability is fixed in 19.2.18, 20.3.6, and 21.0.0-next.8.

AI-Powered Analysis

AILast updated: 10/24/2025, 00:50:54 UTC

Technical Analysis

CVE-2025-62427 is a Server-Side Request Forgery (SSRF) vulnerability identified in Angular's Server-Side Rendering (SSR) package (@angular/ssr) prior to versions 19.2.18, 20.3.6, and 21.0.0-next.8. The vulnerability stems from the createRequestUrl function, which uses the native URL constructor to resolve URLs during SSR. When an incoming request path begins with double forward slashes (//) or backslashes (\\), the URL constructor interprets this as a schema-relative URL, overriding the intended base URL's hostname with an attacker-controlled hostname. This manipulation causes the SSR environment to set the page's virtual location to the attacker's domain. Consequently, any relative HTTP requests made during SSR, such as HttpClient.get('assets/data.json'), are resolved against the malicious domain, forcing the server to communicate with external endpoints controlled by the attacker. This can lead to unauthorized data exfiltration, internal network scanning, or other SSRF-related impacts. The vulnerability requires no authentication or user interaction and can be exploited remotely. It affects Angular CLI versions in the specified ranges and has a CVSS 4.0 score of 8.7, indicating high severity. The flaw has been addressed in the patched versions mentioned, but no known exploits are currently reported in the wild.

Potential Impact

For European organizations, this SSRF vulnerability poses significant risks, particularly for those deploying Angular SSR in production environments. Exploitation can lead to unauthorized internal network access, data leakage, or interaction with internal services not intended to be exposed externally. This can compromise confidentiality and integrity of sensitive data and potentially disrupt availability if the attacker leverages the SSRF to perform denial-of-service attacks on internal resources. Organizations relying on Angular SSR for rendering dynamic content on their websites or applications may inadvertently expose backend services or cloud metadata endpoints. Given the widespread use of Angular in Europe’s web development ecosystem, especially in sectors like finance, government, and e-commerce, the impact could be substantial. Attackers could exploit this vulnerability to pivot into internal networks or exfiltrate sensitive information, increasing the risk of data breaches and regulatory non-compliance under GDPR.

Mitigation Recommendations

The primary mitigation is to upgrade Angular SSR packages to versions 19.2.18, 20.3.6, 21.0.0-next.8, or later, where the vulnerability is fixed. Organizations should audit their Angular SSR implementations to ensure no untrusted input can influence URL paths starting with // or \\. Implement strict input validation and sanitization on incoming request URLs to prevent schema-relative URL injection. Additionally, configure network egress controls to restrict SSR server outbound HTTP requests to only trusted domains and internal services, limiting the impact of potential SSRF exploitation. Employ runtime monitoring and logging to detect unusual outbound requests originating from SSR processes. Consider using Web Application Firewalls (WAFs) with SSRF detection capabilities to block suspicious requests. Finally, conduct security testing focused on SSRF scenarios in Angular SSR environments to identify and remediate any residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-13T16:26:12.180Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f140779f8a5dbaeaf6e5c8

Added to database: 10/16/2025, 6:59:03 PM

Last enriched: 10/24/2025, 12:50:54 AM

Last updated: 12/4/2025, 2:15:08 PM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats