High-Severity XSS Vulnerability (CVE-2026-32635) Discovered in Angular Framework
A critical Cross-Site Scripting (XSS) vulnerability, CVE-2026-32635, has been identified in Angular, a widely used web application framework. The flaw resides in the framework’s runtime and compiler, specifically affecting internationalization (i18n) attribute bindings.
The vulnerability allows attackers to bypass Angular’s built-in sanitization mechanisms, enabling the injection of malicious scripts into web applications. Exploitation occurs when developers combine sensitive HTML attributes (e.g., href, src, action, background, data, formaction) with i18n tags, creating a blind spot in Angular’s security protections. If untrusted user input is bound to these attributes while marked for internationalization, the sanitization process is completely circumvented.
With a High severity rating, the flaw has low attack complexity and can be exploited remotely. Successful attacks could lead to:
- Session hijacking (theft of cookies/authentication tokens, enabling account takeovers).
- Data exfiltration (capture and transmission of sensitive user data to attacker-controlled servers).
- Unauthorized actions (manipulation of application functions on behalf of victims).
The vulnerability affects @angular/compiler and @angular/core packages across multiple release branches, specifically versions 17.0.0 through 22.0.0-next.2. The Angular team has released patches for the following versions:
- 22.0.0-next.3
- 21.2.4
- 20.3.18
- 19.2.20
Legacy versions (17 and 18) remain unpatched, requiring immediate mitigation for affected applications. Recommended workarounds include:
- Blocking untrusted input bound to vulnerable attributes.
- Removing i18n tags from attributes handling untrusted data.
- Enforcing manual sanitization via Angular’s DomSanitizer utility.
Source: https://gbhackers.com/angular-xss-vulnerability/
Angular cybersecurity rating report: https://www.rankiteo.com/company/angularframework
"id": "ANG1773750677",
"linkid": "angularframework",
"type": "Vulnerability",
"date": "3/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Developers and organizations '
'using affected Angular versions '
'(17.0.0 through 22.0.0-next.2)',
'industry': 'Technology/Software Development',
'name': 'Angular Framework',
'type': 'Software Framework'}],
'attack_vector': 'Remote',
'data_breach': {'data_exfiltration': 'Possible',
'personally_identifiable_information': 'Possible',
'sensitivity_of_data': 'High',
'type_of_data_compromised': 'Authentication tokens, session '
'cookies, sensitive user data'},
'description': 'A critical Cross-Site Scripting (XSS) vulnerability, '
'CVE-2026-32635, has been identified in Angular, a widely used '
'web application framework. The flaw resides in the '
'framework’s runtime and compiler, specifically affecting '
'internationalization (i18n) attribute bindings. The '
'vulnerability allows attackers to bypass Angular’s built-in '
'sanitization mechanisms, enabling the injection of malicious '
'scripts into web applications. Exploitation occurs when '
'developers combine sensitive HTML attributes with i18n tags, '
'creating a blind spot in Angular’s security protections. '
'Successful attacks could lead to session hijacking, data '
'exfiltration, and unauthorized actions.',
'impact': {'data_compromised': 'Sensitive user data, authentication tokens, '
'session cookies',
'identity_theft_risk': 'High',
'operational_impact': 'Session hijacking, unauthorized actions, '
'data exfiltration',
'systems_affected': 'Web applications using Angular framework '
'(versions 17.0.0 through 22.0.0-next.2)'},
'post_incident_analysis': {'corrective_actions': 'Patches released for '
'affected versions. '
'Workarounds provided for '
'legacy versions.',
'root_causes': 'Combination of sensitive HTML '
'attributes with i18n tags bypasses '
'Angular’s built-in sanitization '
'mechanisms.'},
'recommendations': 'Apply patches immediately. For unpatched versions, '
'implement workarounds such as blocking untrusted input, '
'removing i18n tags from vulnerable attributes, and using '
'DomSanitizer for manual sanitization.',
'references': [{'source': 'Angular Security Advisory'}],
'response': {'containment_measures': 'Patches released for versions '
'22.0.0-next.3, 21.2.4, 20.3.18, and '
'19.2.20. Workarounds include blocking '
'untrusted input, removing i18n tags '
'from vulnerable attributes, and '
'enforcing manual sanitization via '
'DomSanitizer.',
'remediation_measures': 'Apply patches for affected versions. '
'Legacy versions (17 and 18) require '
'manual mitigation.'},
'title': 'High-Severity XSS Vulnerability (CVE-2026-32635) Discovered in '
'Angular Framework',
'type': 'Cross-Site Scripting (XSS)',
'vulnerability_exploited': 'CVE-2026-32635'}