CVE-2026-27738: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in angular angular-cli
The Angular SSR is a server-rise rendering tool for Angular applications. An Open Redirect vulnerability exists in the internal URL processing logic in versions on the 19.x branch prior to 19.2.21, the 20.x branch prior to 20.3.17, and the 21.x branch prior to 21.1.5 and 21.2.0-rc.1. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker can provide a value starting with three slashes. This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking. In order to be vulnerable, the application must use Angular SSR, the application must have routes that perform internal redirects, the infrastructure (Reverse Proxy/CDN) must pass the `X-Forwarded-Prefix` header to the SSR process without sanitization, and the cache must not vary on the `X-Forwarded-Prefix` header. Versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 contain a patch. Until the patch is applied, developers should sanitize the `X-Forwarded-Prefix` header in their`server.ts` before the Angular engine processes the request.
AI Analysis
Technical Summary
CVE-2026-27738 is an Open Redirect vulnerability (CWE-601) found in Angular SSR implementations within angular-cli versions before 19.2.21, 20.3.17, and 21.1.5/21.2.0-rc.1. Angular SSR is a server-side rendering tool that improves performance and SEO for Angular applications. The vulnerability stems from the internal URL processing logic that normalizes URL segments by stripping only a single leading slash. When deployed behind a reverse proxy or CDN that forwards the X-Forwarded-Prefix header, an attacker can supply a value starting with three slashes (e.g., ///evil.com), which bypasses the normalization and causes the SSR application to redirect users to an untrusted external site. This behavior can be abused for large-scale phishing campaigns, where users are redirected to malicious sites appearing as legitimate, and for SEO hijacking, where attackers manipulate search engine rankings by redirecting traffic. To be vulnerable, the application must use Angular SSR, have routes performing internal redirects, rely on infrastructure passing the X-Forwarded-Prefix header without sanitization, and have caching mechanisms that do not vary based on this header. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. Angular has released patches in versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 to fix this issue by properly handling URL normalization and header sanitization. Until these patches are applied, developers are advised to sanitize the X-Forwarded-Prefix header manually in their server.ts files before Angular processes the request to prevent exploitation.
Potential Impact
This vulnerability allows attackers to redirect users of vulnerable Angular SSR applications to malicious external websites without their consent or knowledge. The primary risks include large-scale phishing attacks, where users may be tricked into divulging sensitive information such as credentials or financial data, and SEO hijacking, which can damage the reputation and search engine rankings of legitimate sites. Organizations running Angular SSR behind proxies or CDNs that forward the X-Forwarded-Prefix header without proper sanitization are at risk. The impact extends to confidentiality (through phishing), integrity (by misleading users and search engines), and availability (potentially through user trust erosion). Because exploitation requires no authentication or user interaction and can be performed remotely, the threat can be widespread and automated. However, the scope is limited to Angular SSR applications with specific infrastructure configurations, reducing the overall attack surface. Nevertheless, organizations relying on Angular SSR for critical web applications, especially those with high user traffic or sensitive data, face significant reputational and operational risks if unpatched.
Mitigation Recommendations
1. Upgrade angular-cli to the patched versions: 19.2.21 or later, 20.3.17 or later, and 21.1.5 or later (including 21.2.0-rc.1). 2. Until patches are applied, implement manual sanitization of the X-Forwarded-Prefix header in the server.ts file to strip or validate multiple leading slashes and reject suspicious header values before Angular SSR processes the request. 3. Configure reverse proxies and CDNs to either not forward the X-Forwarded-Prefix header or sanitize it to prevent multiple leading slashes. 4. Adjust caching policies to vary cache entries based on the X-Forwarded-Prefix header to avoid serving cached malicious redirects. 5. Audit application routes that perform internal redirects to ensure they validate and constrain redirect targets strictly to trusted internal URLs. 6. Monitor web traffic and logs for unusual redirect patterns or requests containing suspicious X-Forwarded-Prefix header values. 7. Educate developers and DevOps teams about this vulnerability and the importance of secure header handling in SSR environments. 8. Employ web application firewalls (WAFs) with rules to detect and block open redirect attempts involving malformed X-Forwarded-Prefix headers.
Affected Countries
United States, Germany, India, United Kingdom, Canada, Australia, France, Japan, South Korea, Brazil
CVE-2026-27738: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in angular angular-cli
Description
The Angular SSR is a server-rise rendering tool for Angular applications. An Open Redirect vulnerability exists in the internal URL processing logic in versions on the 19.x branch prior to 19.2.21, the 20.x branch prior to 20.3.17, and the 21.x branch prior to 21.1.5 and 21.2.0-rc.1. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker can provide a value starting with three slashes. This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking. In order to be vulnerable, the application must use Angular SSR, the application must have routes that perform internal redirects, the infrastructure (Reverse Proxy/CDN) must pass the `X-Forwarded-Prefix` header to the SSR process without sanitization, and the cache must not vary on the `X-Forwarded-Prefix` header. Versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 contain a patch. Until the patch is applied, developers should sanitize the `X-Forwarded-Prefix` header in their`server.ts` before the Angular engine processes the request.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27738 is an Open Redirect vulnerability (CWE-601) found in Angular SSR implementations within angular-cli versions before 19.2.21, 20.3.17, and 21.1.5/21.2.0-rc.1. Angular SSR is a server-side rendering tool that improves performance and SEO for Angular applications. The vulnerability stems from the internal URL processing logic that normalizes URL segments by stripping only a single leading slash. When deployed behind a reverse proxy or CDN that forwards the X-Forwarded-Prefix header, an attacker can supply a value starting with three slashes (e.g., ///evil.com), which bypasses the normalization and causes the SSR application to redirect users to an untrusted external site. This behavior can be abused for large-scale phishing campaigns, where users are redirected to malicious sites appearing as legitimate, and for SEO hijacking, where attackers manipulate search engine rankings by redirecting traffic. To be vulnerable, the application must use Angular SSR, have routes performing internal redirects, rely on infrastructure passing the X-Forwarded-Prefix header without sanitization, and have caching mechanisms that do not vary based on this header. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. Angular has released patches in versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 to fix this issue by properly handling URL normalization and header sanitization. Until these patches are applied, developers are advised to sanitize the X-Forwarded-Prefix header manually in their server.ts files before Angular processes the request to prevent exploitation.
Potential Impact
This vulnerability allows attackers to redirect users of vulnerable Angular SSR applications to malicious external websites without their consent or knowledge. The primary risks include large-scale phishing attacks, where users may be tricked into divulging sensitive information such as credentials or financial data, and SEO hijacking, which can damage the reputation and search engine rankings of legitimate sites. Organizations running Angular SSR behind proxies or CDNs that forward the X-Forwarded-Prefix header without proper sanitization are at risk. The impact extends to confidentiality (through phishing), integrity (by misleading users and search engines), and availability (potentially through user trust erosion). Because exploitation requires no authentication or user interaction and can be performed remotely, the threat can be widespread and automated. However, the scope is limited to Angular SSR applications with specific infrastructure configurations, reducing the overall attack surface. Nevertheless, organizations relying on Angular SSR for critical web applications, especially those with high user traffic or sensitive data, face significant reputational and operational risks if unpatched.
Mitigation Recommendations
1. Upgrade angular-cli to the patched versions: 19.2.21 or later, 20.3.17 or later, and 21.1.5 or later (including 21.2.0-rc.1). 2. Until patches are applied, implement manual sanitization of the X-Forwarded-Prefix header in the server.ts file to strip or validate multiple leading slashes and reject suspicious header values before Angular SSR processes the request. 3. Configure reverse proxies and CDNs to either not forward the X-Forwarded-Prefix header or sanitize it to prevent multiple leading slashes. 4. Adjust caching policies to vary cache entries based on the X-Forwarded-Prefix header to avoid serving cached malicious redirects. 5. Audit application routes that perform internal redirects to ensure they validate and constrain redirect targets strictly to trusted internal URLs. 6. Monitor web traffic and logs for unusual redirect patterns or requests containing suspicious X-Forwarded-Prefix header values. 7. Educate developers and DevOps teams about this vulnerability and the importance of secure header handling in SSR environments. 8. Employ web application firewalls (WAFs) with rules to detect and block open redirect attempts involving malformed X-Forwarded-Prefix headers.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T18:37:14.790Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f6e70b7ef31ef0b5a0a07
Added to database: 2/25/2026, 9:49:36 PM
Last enriched: 3/5/2026, 9:49:18 AM
Last updated: 4/12/2026, 7:06:10 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.