CVE-2026-27738
February 25, 2026
The Angular SSR is a server-rise rendering tool for Angular applications. An Open Redirect vulnerability exists in the internal URL processing logic in versions on the 19.x branch prior to 19.2.21, the 20.x branch prior to 20.3.17, and the 21.x branch prior to 21.1.5 and 21.2.0-rc.1. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash. When an Angular SSR application is deployed behind a proxy that passes the "X-Forwarded-Prefix" header, an attacker can provide a value starting with three slashes. This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking. In order to be vulnerable, the application must use Angular SSR, the application must have routes that perform internal redirects, the infrastructure (Reverse Proxy/CDN) must pass the "X-Forwarded-Prefix" header to the SSR process without sanitization, and the cache must not vary on the "X-Forwarded-Prefix" header. Versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 contain a patch. Until the patch is applied, developers should sanitize the "X-Forwarded-Prefix" header in their"server.ts" before the Angular engine processes the request.
Affected Packages
https://github.com/angular/angular-cli.git (GITHUB):
Affected version(s) >=v20.3.14 <v20.3.17Fix Suggestion:
Update to version v20.3.17https://github.com/angular/angular-cli.git (GITHUB):
Affected version(s) >=v21.0.3 <v21.1.5Fix Suggestion:
Update to version v21.1.5https://github.com/angular/angular-cli.git (GITHUB):
Affected version(s) =v19.2.20 <v19.2.21Fix Suggestion:
Update to version v19.2.21@angular/ssr (NPM):
Affected version(s) >=20.0.0-next.0 <20.3.17Fix Suggestion:
Update to version 20.3.17@angular/ssr (NPM):
Affected version(s) >=21.0.0-next.0 <21.1.5Fix Suggestion:
Update to version 21.1.5@angular/ssr (NPM):
Affected version(s) >=19.0.0-next.0 <19.2.21Fix Suggestion:
Update to version 19.2.21Related ResourcesĀ (7)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
LOW
Subsequent System Integrity
LOW
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.2
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
URL Redirection to Untrusted Site ('Open Redirect')
EPSS
Base Score:
0.06