Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2025-59052
September 10, 2025
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Angular uses a DI container (the "platform injector") to hold request-specific state during server-side rendering. For historical reasons, the container was stored as a JavaScript module-scoped global variable. When multiple requests are processed concurrently, they could inadvertently share or overwrite the global injector state. In practical terms, this can lead to one request responding with data meant for a completely different request, leaking data or tokens included on the rendered page or in response headers. As long as an attacker had network access to send any traffic that received a rendered response, they may have been able to send a large number of requests and then inspect the responses for information leaks. The APIs "bootstrapApplication", "getPlatform", and "destroyPlatform" were vulnerable and required SSR-only breaking changes. The issue has been patched in all active release lines as well as in the v21 prerelease. Patched packages include "@angular/platform-server" 21.0.0-next.3, 20.3.0, 19.2.15, and 18.2.14 and "@angular/ssr" 21.0.0-next.3, 20.3.0, 19.2.16, and 18.2.21. Several workarounds are available. Disable SSR via Server Routes or builder options, remove any asynchronous behavior from custom "bootstrap" functions, remove uses of "getPlatform()" in application code, and/or ensure that the server build defines "ngJitMode" as false.
Affected Packages
https://github.com/angular/angular.git (GITHUB):
Affected version(s) >=20.0.0-next.0 <20.3.0
Fix Suggestion:
Update to version 20.3.0
https://github.com/angular/angular.git (GITHUB):
Affected version(s) >=16.0.0-next.0 <18.2.14
Fix Suggestion:
Update to version 18.2.14
https://github.com/angular/angular.git (GITHUB):
Affected version(s) >=19.0.0-next.0 <19.2.15
Fix Suggestion:
Update to version 19.2.15
https://github.com/angular/angular.git (GITHUB):
Affected version(s) >=21.0.0-next.0 <21.0.0-next.3
Fix Suggestion:
Update to version 21.0.0-next.3
@angular/ssr (NPM):
Affected version(s) >=17.0.0-next.0 <18.2.21
Fix Suggestion:
Update to version 18.2.21
@angular/platform-server (NPM):
Affected version(s) >=16.0.0-next.0 <18.2.14
Fix Suggestion:
Update to version 18.2.14
@angular/platform-server (NPM):
Affected version(s) >=20.0.0-next.0 <20.3.0
Fix Suggestion:
Update to version 20.3.0
@angular/platform-server (NPM):
Affected version(s) >=21.0.0-next.0 <21.0.0-next.3
Fix Suggestion:
Update to version 21.0.0-next.3
@angular/ssr (NPM):
Affected version(s) >=21.0.0-next.0 <21.0.0-next.3
Fix Suggestion:
Update to version 21.0.0-next.3
@angular/ssr (NPM):
Affected version(s) >=19.0.0-next.0 <19.2.16
Fix Suggestion:
Update to version 19.2.16
@angular/ssr (NPM):
Affected version(s) >=20.0.0-next.0 <20.3.0
Fix Suggestion:
Update to version 20.3.0
@angular/platform-server (NPM):
Affected version(s) >=19.0.0-next.0 <19.2.15
Fix Suggestion:
Update to version 19.2.15
Do you need more information?
Contact Us
CVSS v4
Base Score:
7.1
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
EPSS
Base Score:
0.05