Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.2

Angular SSR allows hackers to control where your site's requests go

CVE-2026-27739 GHSA-x288-3778-4hhx
Summary

Angular's Server-Side Rendering (SSR) feature has a security weakness that lets attackers redirect your website's requests to any external server. This could happen through a malicious URL or by manipulating headers. To fix this, update to the latest Angular version and ensure that user-controlled headers are validated and sanitized before using them to determine the application's base origin.

What to do
  • Update angular ssr to version 21.2.0-rc.1.
  • Update angular ssr to version 21.1.5.
  • Update angular ssr to version 20.3.17.
  • Update angular ssr to version 19.2.21.
Affected software
VendorProductAffected versionsFix available
angular ssr > 21.2.0-next.0 , <= 21.2.0-rc.0 21.2.0-rc.1
angular ssr > 21.0.0-next.0 , <= 21.1.5 21.1.5
angular ssr > 20.0.0-next.0 , <= 20.3.17 20.3.17
angular ssr <= 19.2.21 19.2.21
nguniversal common <= 16.2.0
nguniversal express-engine <= 16.2.0
Original title
Angular SSR is vulnerable to SSRF and Header Injection via request handling pipeline
Original description
A [Server-Side Request Forgery (SSRF)](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/SSRF) vulnerability has been identified in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and `X-Forwarded-*` family to determine the application's base origin without any validation of the destination domain.

Specifically, the framework didn't have checks for the following:
- **Host Domain**: The `Host` and `X-Forwarded-Host` headers were not checked to belong to a trusted origin. This allows an attacker to redefine the "base" of the application to an arbitrary external domain.
- **Path & Character Sanitization**: The `X-Forwarded-Host` header was not checked for path segments or special characters, allowing manipulation of the base path for all resolved relative URLs.
- **Port Validation**: The `X-Forwarded-Port` header was not verified as numeric, leading to malformed URI construction or injection attacks.


This vulnerability manifests in two primary ways:

- **Implicit Relative URL Resolution**: Angular's `HttpClient` resolves relative URLs against this unvalidated and potentially malformed base origin. An attacker can "steer" these requests to an external server or internal service.
- **Explicit Manual Construction**: Developers injecting the `REQUEST` object to manually construct URLs (for fetch or third-party SDKs) directly inherit these unsanitized values. By accessing the `Host` / `X-Forwarded-*` headers, the application logic may perform requests to attacker-controlled destinations or malformed endpoints.

### Impact

When successfully exploited, this vulnerability allows for arbitrary internal request steering. This can lead to:
- **Credential Exfiltration**: Stealing sensitive `Authorization` headers or session cookies by redirecting them to an attacker's server.
- **Internal Network Probing**: Accessing and transmitting data from internal services, databases, or cloud metadata endpoints (e.g., `169.254.169.254`) not exposed to the public internet.
- Confidentiality Breach: Accessing sensitive information processed within the application's server-side context.

### Attack Preconditions

- The victim application must use Angular SSR (Server-Side Rendering).
- The application must perform `HttpClient` requests using relative URLs OR manually construct URLs using the unvalidated `Host` / `X-Forwarded-*` headers using the `REQUEST` object.
- **Direct Header Access**: The application server is reachable by an attacker who can influence these headers without strict validation from a front-facing proxy.
- **Lack of Upstream Validation**: The infrastructure (Cloud, CDN, or Load Balancer) does not sanitize or validate incoming headers.

### Patches

- 21.2.0-rc.1
- 21.1.5
- 20.3.17
- 19.2.21


### Workarounds
- **Use Absolute URLs:** Avoid using `req.headers` for URL construction. Instead, use trusted variables for your base API paths.
- **Implement Strict Header Validation (Middleware)**: If you cannot upgrade immediately, implement a middleware in your `server.ts` to enforce numeric ports and validated hostnames.

```ts
const ALLOWED_HOSTS = new Set(['your-domain.com']);

app.use((req, res, next) => {
const hostHeader = (req.headers['x-forwarded-host'] ?? req.headers['host'])?.toString();
const portHeader = req.headers['x-forwarded-port']?.toString();

if (hostHeader) {
const hostname = hostHeader.split(':')[0];
// Reject if hostname contains path separators or is not in allowlist
if (/^[a-z0-9.:-]+$/i.test(hostname) ||
(!ALLOWED_HOSTS.has(hostname) && hostname !== 'localhost')) {
return res.status(400).send('Invalid Hostname');
}
}

// Ensure port is strictly numeric if provided
if (portHeader && !/^\d+$/.test(portHeader)) {
return res.status(400).send('Invalid Port');
}

next();
});
```

### References

- [Fix](https://github.com/angular/angular-cli/pull/32516)
- [Docs](https://angular.dev/best-practices/security#preventing-server-side-request-forgery-ssrf)
nvd CVSS4.0 9.2
Vulnerability type
CWE-918 Server-Side Request Forgery (SSRF)
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026