Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27738: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in angular angular-cli

0
Medium
VulnerabilityCVE-2026-27738cvecve-2026-27738cwe-601
Published: Wed Feb 25 2026 (02/25/2026, 16:40:44 UTC)
Source: CVE Database V5
Vendor/Project: angular
Product: angular-cli

Description

The Angular SSR is a server-rise rendering tool for Angular applications. An Open Redirect vulnerability exists in the internal URL processing logic in versions on the 19.x branch prior to 19.2.21, the 20.x branch prior to 20.3.17, and the 21.x branch prior to 21.1.5 and 21.2.0-rc.1. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker can provide a value starting with three slashes. This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking. In order to be vulnerable, the application must use Angular SSR, the application must have routes that perform internal redirects, the infrastructure (Reverse Proxy/CDN) must pass the `X-Forwarded-Prefix` header to the SSR process without sanitization, and the cache must not vary on the `X-Forwarded-Prefix` header. Versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 contain a patch. Until the patch is applied, developers should sanitize the `X-Forwarded-Prefix` header in their`server.ts` before the Angular engine processes the request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:49:18 UTC

Technical Analysis

CVE-2026-27738 is an Open Redirect vulnerability (CWE-601) found in Angular SSR implementations within angular-cli versions before 19.2.21, 20.3.17, and 21.1.5/21.2.0-rc.1. Angular SSR is a server-side rendering tool that improves performance and SEO for Angular applications. The vulnerability stems from the internal URL processing logic that normalizes URL segments by stripping only a single leading slash. When deployed behind a reverse proxy or CDN that forwards the X-Forwarded-Prefix header, an attacker can supply a value starting with three slashes (e.g., ///evil.com), which bypasses the normalization and causes the SSR application to redirect users to an untrusted external site. This behavior can be abused for large-scale phishing campaigns, where users are redirected to malicious sites appearing as legitimate, and for SEO hijacking, where attackers manipulate search engine rankings by redirecting traffic. To be vulnerable, the application must use Angular SSR, have routes performing internal redirects, rely on infrastructure passing the X-Forwarded-Prefix header without sanitization, and have caching mechanisms that do not vary based on this header. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. Angular has released patches in versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 to fix this issue by properly handling URL normalization and header sanitization. Until these patches are applied, developers are advised to sanitize the X-Forwarded-Prefix header manually in their server.ts files before Angular processes the request to prevent exploitation.

Potential Impact

This vulnerability allows attackers to redirect users of vulnerable Angular SSR applications to malicious external websites without their consent or knowledge. The primary risks include large-scale phishing attacks, where users may be tricked into divulging sensitive information such as credentials or financial data, and SEO hijacking, which can damage the reputation and search engine rankings of legitimate sites. Organizations running Angular SSR behind proxies or CDNs that forward the X-Forwarded-Prefix header without proper sanitization are at risk. The impact extends to confidentiality (through phishing), integrity (by misleading users and search engines), and availability (potentially through user trust erosion). Because exploitation requires no authentication or user interaction and can be performed remotely, the threat can be widespread and automated. However, the scope is limited to Angular SSR applications with specific infrastructure configurations, reducing the overall attack surface. Nevertheless, organizations relying on Angular SSR for critical web applications, especially those with high user traffic or sensitive data, face significant reputational and operational risks if unpatched.

Mitigation Recommendations

1. Upgrade angular-cli to the patched versions: 19.2.21 or later, 20.3.17 or later, and 21.1.5 or later (including 21.2.0-rc.1). 2. Until patches are applied, implement manual sanitization of the X-Forwarded-Prefix header in the server.ts file to strip or validate multiple leading slashes and reject suspicious header values before Angular SSR processes the request. 3. Configure reverse proxies and CDNs to either not forward the X-Forwarded-Prefix header or sanitize it to prevent multiple leading slashes. 4. Adjust caching policies to vary cache entries based on the X-Forwarded-Prefix header to avoid serving cached malicious redirects. 5. Audit application routes that perform internal redirects to ensure they validate and constrain redirect targets strictly to trusted internal URLs. 6. Monitor web traffic and logs for unusual redirect patterns or requests containing suspicious X-Forwarded-Prefix header values. 7. Educate developers and DevOps teams about this vulnerability and the importance of secure header handling in SSR environments. 8. Employ web application firewalls (WAFs) with rules to detect and block open redirect attempts involving malformed X-Forwarded-Prefix headers.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T18:37:14.790Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f6e70b7ef31ef0b5a0a07

Added to database: 2/25/2026, 9:49:36 PM

Last enriched: 3/5/2026, 9:49:18 AM

Last updated: 4/12/2026, 7:06:10 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses