Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27739: CWE-918: Server-Side Request Forgery (SSRF) in angular angular-cli

0
Critical
VulnerabilityCVE-2026-27739cvecve-2026-27739cwe-918
Published: Wed Feb 25 2026 (02/25/2026, 16:47:29 UTC)
Source: CVE Database V5
Vendor/Project: angular
Product: angular-cli

Description

The Angular SSR is a server-rise rendering tool for Angular applications. Versions prior to 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 have a Server-Side Request Forgery (SSRF) vulnerability in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and `X-Forwarded-*` family to determine the application's base origin without any validation of the destination domain. Specifically, the framework didn't have checks for the host domain, path and character sanitization, and port validation. This vulnerability manifests in two primary ways: implicit relative URL resolution and explicit manual construction. When successfully exploited, this vulnerability allows for arbitrary internal request steering. This can lead to credential exfiltration, internal network probing, and a confidentiality breach. In order to be vulnerable, the victim application must use Angular SSR (Server-Side Rendering), the application must perform `HttpClient` requests using relative URLs OR manually construct URLs using the unvalidated `Host` / `X-Forwarded-*` headers using the `REQUEST` object, the application server must be reachable by an attacker who can influence these headers without strict validation from a front-facing proxy, and the infrastructure (Cloud, CDN, or Load Balancer) must not sanitize or validate incoming headers. Versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 contain a patch. Some workarounds are available. Avoid using `req.headers` for URL construction. Instead, use trusted variables for base API paths. Those who cannot upgrade immediately should implement a middleware in their `server.ts` to enforce numeric ports and validated hostnames.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:51:58 UTC

Technical Analysis

CVE-2026-27739 is a critical SSRF vulnerability in Angular's Server-Side Rendering (SSR) pipeline affecting angular-cli versions before 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21. The vulnerability stems from Angular's internal URL reconstruction logic that directly trusts user-controlled HTTP headers, specifically the Host and X-Forwarded-* headers, to determine the application's base origin without validating the destination domain, path, characters, or port. This lack of validation enables attackers to craft malicious requests that cause the SSR server to make arbitrary internal HTTP requests. The vulnerability manifests through two main vectors: implicit relative URL resolution in HttpClient requests and explicit manual URL construction using the unvalidated REQUEST object headers. For exploitation, the target application must use Angular SSR, perform HttpClient requests with relative URLs or manual URL construction from headers, have a server accessible to attackers who can influence these headers, and lack upstream infrastructure sanitization of these headers. Exploiting this SSRF can lead to internal network scanning, exfiltration of sensitive credentials, and breaches of confidentiality within internal services. Angular has addressed this issue in versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 by adding validation and sanitization of these headers. Workarounds include avoiding reliance on req.headers for URL construction and implementing middleware to enforce strict hostname and numeric port validation. The CVSS 4.0 score is 9.2 (critical), reflecting the vulnerability's high impact and ease of exploitation without authentication or user interaction. No known exploits have been reported in the wild as of now.

Potential Impact

The impact of CVE-2026-27739 is significant for organizations using Angular SSR in vulnerable versions. Successful exploitation allows attackers to perform SSRF attacks, enabling them to send arbitrary HTTP requests from the server to internal or external systems. This can lead to internal network reconnaissance, exposing sensitive infrastructure details, and potentially pivoting attacks deeper into the network. Credential exfiltration is possible if internal services expose sensitive tokens or secrets accessible via SSRF. Confidentiality breaches may occur if internal-only services or data stores are accessed. Since SSRF can bypass perimeter defenses by leveraging the server's network access, it poses a high risk to cloud-hosted applications and microservice architectures. Organizations relying on Angular SSR without proper header validation or infrastructure sanitization are at risk of data leakage, service disruption, and further compromise. The vulnerability's critical severity and no requirement for authentication or user interaction make it a high-priority issue for affected environments.

Mitigation Recommendations

To mitigate CVE-2026-27739, organizations should immediately upgrade Angular CLI and Angular SSR to versions 21.2.0-rc.1, 21.1.5, 20.3.17, or 19.2.21 or later, where the vulnerability is patched. If immediate upgrade is not feasible, implement middleware in the server.ts file to strictly validate and sanitize incoming Host and X-Forwarded-* headers, enforcing allowed hostnames and numeric port ranges. Avoid constructing URLs for HttpClient requests using untrusted headers such as req.headers; instead, use hardcoded or environment-configured trusted base URLs. Ensure that front-facing proxies, load balancers, CDNs, or cloud infrastructure sanitize or reject suspicious or malformed headers to prevent attacker-controlled header injection. Conduct thorough code reviews to identify any manual URL constructions relying on unvalidated headers and refactor them accordingly. Employ network segmentation and internal service authentication to limit the impact of SSRF if exploited. Monitor logs for unusual internal requests originating from SSR components. Finally, educate developers about the risks of trusting client-supplied headers in server-side rendering contexts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T18:37:14.790Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f6e6fb7ef31ef0b5a094a

Added to database: 2/25/2026, 9:49:35 PM

Last enriched: 3/5/2026, 9:51:58 AM

Last updated: 4/12/2026, 9:10:36 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses