CVE-2026-27738: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in angular angular-cli
The Angular SSR is a server-rise rendering tool for Angular applications. An Open Redirect vulnerability exists in the internal URL processing logic in versions on the 19.x branch prior to 19.2.21, the 20.x branch prior to 20.3.17, and the 21.x branch prior to 21.1.5 and 21.2.0-rc.1. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker can provide a value starting with three slashes. This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking. In order to be vulnerable, the application must use Angular SSR, the application must have routes that perform internal redirects, the infrastructure (Reverse Proxy/CDN) must pass the `X-Forwarded-Prefix` header to the SSR process without sanitization, and the cache must not vary on the `X-Forwarded-Prefix` header. Versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 contain a patch. Until the patch is applied, developers should sanitize the `X-Forwarded-Prefix` header in their`server.ts` before the Angular engine processes the request.
AI Analysis
Technical Summary
CVE-2026-27738 is an Open Redirect vulnerability (CWE-601) affecting Angular SSR (Server-Side Rendering) implementations in angular-cli versions prior to 19.2.21, 20.3.17, and 21.1.5/21.2.0-rc.1. The root cause lies in the internal URL processing logic that normalizes URL segments by stripping only a single leading slash. When Angular SSR applications are deployed behind reverse proxies or CDNs that forward the X-Forwarded-Prefix HTTP header without proper sanitization, an attacker can supply a value starting with three slashes (e.g., ///malicious.com). Due to insufficient normalization, this crafted header can cause the SSR engine to redirect users to untrusted external sites. Exploiting this vulnerability enables large-scale phishing campaigns and SEO hijacking by manipulating URLs to redirect users to attacker-controlled domains. For exploitation, the application must use Angular SSR, have routes performing internal redirects, the infrastructure must forward the X-Forwarded-Prefix header unsanitized, and caching mechanisms must not vary based on this header. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. Angular has released patches in versions 19.2.21, 20.3.17, 21.1.5, and 21.2.0-rc.1 to address this issue by improving URL normalization and header handling. Until patches are applied, developers are advised to manually sanitize the X-Forwarded-Prefix header in their server.ts files before Angular processes requests to prevent malicious redirects.
Potential Impact
The vulnerability allows attackers to redirect users of Angular SSR applications to arbitrary external URLs without their consent, facilitating phishing attacks that can steal credentials or deliver malware. SEO hijacking can also damage the reputation and search rankings of affected websites by injecting malicious redirects. Because the exploit requires no authentication or user interaction and can be triggered remotely, it poses a significant risk to any organization deploying vulnerable Angular SSR apps behind proxies forwarding the X-Forwarded-Prefix header. The impact extends to user trust, brand reputation, and potential regulatory consequences if user data is compromised via phishing. Additionally, compromised SEO rankings can lead to long-term business losses. Organizations with high-traffic Angular SSR applications, especially those relying on reverse proxies or CDNs that forward headers without sanitization, are at elevated risk. The vulnerability’s medium severity reflects a moderate but tangible risk that can be mitigated with proper patching and header validation.
Mitigation Recommendations
1. Upgrade Angular CLI to patched versions: 19.2.21 or later, 20.3.17 or later, and 21.1.5 or later (including 21.2.0-rc.1). 2. Until patches are applied, implement manual sanitization of the X-Forwarded-Prefix header in the server.ts file or equivalent server-side entry point to strip or validate multiple leading slashes and reject suspicious values. 3. Configure reverse proxies and CDNs to avoid forwarding the X-Forwarded-Prefix header to the SSR process unless absolutely necessary, or sanitize it at the proxy level. 4. Ensure caching mechanisms vary on the X-Forwarded-Prefix header to prevent cache poisoning or unintended reuse of malicious redirects. 5. Audit application routes that perform internal redirects to confirm they do not blindly trust header values for URL construction. 6. Implement monitoring and alerting for unusual redirect patterns or spikes in redirect-related errors. 7. Educate developers and DevOps teams about this vulnerability and secure header handling best practices. 8. Conduct penetration testing or code reviews focusing on SSR URL handling and header processing to identify residual risks.
Affected Countries
United States, Germany, India, United Kingdom, Canada, Australia, France, Japan, Netherlands, Brazil, South Korea
CVE-2026-27738: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in angular angular-cli
Description
The Angular SSR is a server-rise rendering tool for Angular applications. An Open Redirect vulnerability exists in the internal URL processing logic in versions on the 19.x branch prior to 19.2.21, the 20.x branch prior to 20.3.17, and the 21.x branch prior to 21.1.5 and 21.2.0-rc.1. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker can provide a value starting with three slashes. This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking. In order to be vulnerable, the application must use Angular SSR, the application must have routes that perform internal redirects, the infrastructure (Reverse Proxy/CDN) must pass the `X-Forwarded-Prefix` header to the SSR process without sanitization, and the cache must not vary on the `X-Forwarded-Prefix` header. Versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 contain a patch. Until the patch is applied, developers should sanitize the `X-Forwarded-Prefix` header in their`server.ts` before the Angular engine processes the request.
AI-Powered Analysis
Technical Analysis
CVE-2026-27738 is an Open Redirect vulnerability (CWE-601) affecting Angular SSR (Server-Side Rendering) implementations in angular-cli versions prior to 19.2.21, 20.3.17, and 21.1.5/21.2.0-rc.1. The root cause lies in the internal URL processing logic that normalizes URL segments by stripping only a single leading slash. When Angular SSR applications are deployed behind reverse proxies or CDNs that forward the X-Forwarded-Prefix HTTP header without proper sanitization, an attacker can supply a value starting with three slashes (e.g., ///malicious.com). Due to insufficient normalization, this crafted header can cause the SSR engine to redirect users to untrusted external sites. Exploiting this vulnerability enables large-scale phishing campaigns and SEO hijacking by manipulating URLs to redirect users to attacker-controlled domains. For exploitation, the application must use Angular SSR, have routes performing internal redirects, the infrastructure must forward the X-Forwarded-Prefix header unsanitized, and caching mechanisms must not vary based on this header. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. Angular has released patches in versions 19.2.21, 20.3.17, 21.1.5, and 21.2.0-rc.1 to address this issue by improving URL normalization and header handling. Until patches are applied, developers are advised to manually sanitize the X-Forwarded-Prefix header in their server.ts files before Angular processes requests to prevent malicious redirects.
Potential Impact
The vulnerability allows attackers to redirect users of Angular SSR applications to arbitrary external URLs without their consent, facilitating phishing attacks that can steal credentials or deliver malware. SEO hijacking can also damage the reputation and search rankings of affected websites by injecting malicious redirects. Because the exploit requires no authentication or user interaction and can be triggered remotely, it poses a significant risk to any organization deploying vulnerable Angular SSR apps behind proxies forwarding the X-Forwarded-Prefix header. The impact extends to user trust, brand reputation, and potential regulatory consequences if user data is compromised via phishing. Additionally, compromised SEO rankings can lead to long-term business losses. Organizations with high-traffic Angular SSR applications, especially those relying on reverse proxies or CDNs that forward headers without sanitization, are at elevated risk. The vulnerability’s medium severity reflects a moderate but tangible risk that can be mitigated with proper patching and header validation.
Mitigation Recommendations
1. Upgrade Angular CLI to patched versions: 19.2.21 or later, 20.3.17 or later, and 21.1.5 or later (including 21.2.0-rc.1). 2. Until patches are applied, implement manual sanitization of the X-Forwarded-Prefix header in the server.ts file or equivalent server-side entry point to strip or validate multiple leading slashes and reject suspicious values. 3. Configure reverse proxies and CDNs to avoid forwarding the X-Forwarded-Prefix header to the SSR process unless absolutely necessary, or sanitize it at the proxy level. 4. Ensure caching mechanisms vary on the X-Forwarded-Prefix header to prevent cache poisoning or unintended reuse of malicious redirects. 5. Audit application routes that perform internal redirects to confirm they do not blindly trust header values for URL construction. 6. Implement monitoring and alerting for unusual redirect patterns or spikes in redirect-related errors. 7. Educate developers and DevOps teams about this vulnerability and secure header handling best practices. 8. Conduct penetration testing or code reviews focusing on SSR URL handling and header processing to identify residual risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T18:37:14.790Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f6e70b7ef31ef0b5a0a07
Added to database: 2/25/2026, 9:49:36 PM
Last enriched: 2/25/2026, 9:59:06 PM
Last updated: 2/26/2026, 8:14:29 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.