Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-27739

Angular SSR is vulnerable to SSRF and Header Injection via request handling pipeline
Back to all
CVE

CVE-2026-27739

Angular SSR is vulnerable to SSRF and Header Injection via request handling pipeline

The Angular SSR is a server-rise rendering tool for Angular applications. Versions prior to 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 have a Server-Side Request Forgery (SSRF) vulnerability in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and X-Forwarded-* family to determine the application's base origin without any validation of the destination domain. Specifically, the framework didn't have checks for the host domain, path and character sanitization, and port validation. This vulnerability manifests in two primary ways: implicit relative URL resolution and explicit manual construction. When successfully exploited, this vulnerability allows for arbitrary internal request steering. This can lead to credential exfiltration, internal network probing, and a confidentiality breach. In order to be vulnerable, the victim application must use Angular SSR (Server-Side Rendering), the application must perform HttpClient requests using relative URLs OR manually construct URLs using the unvalidated Host / X-Forwarded-* headers using the REQUEST object, the application server must be reachable by an attacker who can influence these headers without strict validation from a front-facing proxy, and the infrastructure (Cloud, CDN, or Load Balancer) must not sanitize or validate incoming headers. Versions 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 contain a patch. Some workarounds are available. Avoid using req.headers for URL construction. Instead, use trusted variables for base API paths. Those who cannot upgrade immediately should implement a middleware in their server.ts to enforce numeric ports and validated hostnames.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
9.2
-
4.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
C
H
U
0
-
C
H
U
-

Related Resources

No items found.

References

https://angular.dev/best-practices/security#preventing-server-side-request-forgery-ssrf, https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/SSRF, https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27739.json, https://github.com/angular/angular-cli/pull/32516, https://github.com/angular/angular-cli/security/advisories/GHSA-x288-3778-4hhx, https://nvd.nist.gov/vuln/detail/CVE-2026-27739

Severity

0

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
0
EPSS Probability
0.00041%
EPSS Percentile
0.12302%
Introduced Version
311e335d1338bc921a43eb91b8587fb014985d76,2c99210e47b22342fea48e86bc61e8ba27fafb63,896d98a31326d88acc3b8ddb80f9de34a71bf3a0,0
Fix Available
99ded1d45b1cf30cf107a69addf95611342a23e4,0ad7cc38e13229ab3d081180dbe3a15ff9c9024f,c0d1626e87b807845d898e30f52e2251aa81c2a0,4d9442a236bb37b95b8a8602389f87716407149c

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading