CVE-2026-33397
March 26, 2026
The Angular SSR is a server-rise rendering tool for Angular applications. Versions on the 22.x branch prior to 22.0.0-next.2, the 21.x branch prior to 21.2.3, and the 20.x branch prior to 20.3.21 have an Open Redirect vulnerability in "@angular/ssr" due to an incomplete fix for CVE-2026-27738. While the original fix successfully blocked multiple leading slashes (e.g., "///"), the internal validation logic fails to account for a single backslash ("\") bypass. When an Angular SSR application is deployed behind a proxy that passes the "X-Forwarded-Prefix" header, an attacker provides a value starting with a single backslash, the internal validation failed to flag the single backslash as invalid, the application prepends a leading forward slash, resulting in a "Location" header containing the URL, and modern browsers interpret the "/\" sequence as "//", treating it as a protocol-relative URL and redirecting the user to the attacker-controlled domain. Furthermore, the response lacks the "Vary: X-Forwarded-Prefix" header, allowing the malicious redirect to be stored in intermediate caches (Web Cache Poisoning). Versions 22.0.0-next.2, 21.2.3, and 20.3.21 contain a patch. Until the patch is applied, developers should sanitize the "X-Forwarded-Prefix" header in their "server.ts" before the Angular engine processes the request.
Affected Packages
@angular/ssr (NPM):
Affected version(s) >=22.0.0-next.0 <22.0.0-next.2Fix Suggestion:
Update to version 22.0.0-next.2@angular/ssr (NPM):
Affected version(s) >=21.0.0-next.0 <21.2.3Fix Suggestion:
Update to version 21.2.3@angular/ssr (NPM):
Affected version(s) >=20.0.0-next.0 <20.3.21Fix Suggestion:
Update to version 20.3.21Related ResourcesĀ (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
LOW
Subsequent System Integrity
LOW
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.2
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
URL Redirection to Untrusted Site ('Open Redirect')
EPSS
Base Score:
0.04