Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-66412
Summary
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. In versions prior to 19.2.17, 20.x prior to 20.3.15, 21.x prior to 21.0.2, 21.1.x prior to 21.1.0-next.1, a Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
- LOW
- NETWORK
- ACTIVE
- LOW
CWE-79 - Cross Site Scripting
Cross-Site Scripting, commonly referred to as XSS, is the most dominant class of vulnerabilities. It allows an attacker to inject malicious code into a pregnable web application and victimize its users. The exploitation of such a weakness can cause severe issues such as account takeover, and sensitive data exfiltration. Because of the prevalence of XSS vulnerabilities and their high rate of exploitation, it has remained in the OWASP top 10 vulnerabilities for years.
References
Advisory Timeline
- Published