Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-27970

Angular i18n vulnerable to Cross-Site Scripting (XSS)
Back to all
CVE

CVE-2026-27970

Angular i18n vulnerable to Cross-Site Scripting (XSS)

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Versions prior to 21.2.0, 21.1.16, 20.3.17, and 19.2.19 have a cross-Site scripting vulnerability in the Angular internationalization (i18n) pipeline. In ICU messages (International Components for Unicode), HTML from translated content was not properly sanitized and could execute arbitrary JavaScript. Angular i18n typically involves three steps, extracting all messages from an application in the source language, sending the messages to be translated, and then merging their translations back into the final source code. Translations are frequently handled by contracts with specific partner companies, and involve sending the source messages to a separate contractor before receiving final translations for display to the end user. If the returned translations have malicious content, it could be rendered into the application and execute arbitrary JavaScript. When successfully exploited, this vulnerability allows for execution of attacker controlled JavaScript in the application origin. Depending on the nature of the application being exploited this could lead to credential exfiltration and/or page vandalism. Several preconditions apply to the attack. The attacker must compromise the translation file (xliff, xtb, etc.). Unlike most XSS vulnerabilities, this issue is not exploitable by arbitrary users. An attacker must first compromise an application's translation file before they can escalate privileges into the Angular application client. The victim application must use Angular i18n, use one or more ICU messages, render an ICU message, and not defend against XSS via a safe content security policy. Versions 21.2.0, 21.1.6, 20.3.17, and 19.2.19 patch the issue. Until the patch is applied, developers should consider reviewing and verifying translated content received from untrusted third parties before incorporating it in an Angular application, enabling strict CSP controls to block unauthorized JavaScript from executing on the page, and enabling Trusted Types to enforce proper HTML sanitization.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
7.6
-
4.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
C
H
U
0
-
C
H
U
-

Related Resources

No items found.

References

https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27970.json, https://github.com/angular/angular/security/advisories/GHSA-prjf-86w9-mfqv, https://nvd.nist.gov/vuln/detail/CVE-2026-27970, https://github.com/angular/angular/commit/306f367899dfc2e04238fecd3455547b5d54075d, https://github.com/angular/angular/commit/7d58b798c626bb0e4e5f89ca8affdce4f352b232, https://github.com/angular/angular/commit/b85830953281ff3a1a77bbfe69019d352d509c93, https://github.com/angular/angular/pull/67183

Severity

0

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
0
EPSS Probability
0.00055%
EPSS Percentile
0.17122%
Introduced Version
bfc2afdb5bf9e668f11ba0a967a5d537e9199b56,a0ee6bdfe4102357dd231bcf02f5ff4d44fb585c,ab2ee22c3d1a80b7ffe2c74c988dbd2503305b70,5537bf802f8eda54ff7572905cf3bb2fc0e0e431,0
Fix Available
7f33cbeb6c15894b5b64954e207d5caf2d4acf7d,523c29f622656b3902727e314a3e369ccd6af00b,043125cc56bdb8666f72aac240dcc8afb6854877,a55475992b6d479f0205c5e03e6a44f9aa48698e

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading