Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-22610
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-10 Jan, 2026 | 04:16
Updated At-23 Feb, 2026 | 18:23

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.18, 20.3.16, 21.0.7, and 21.1.0-rc.0, a cross-site scripting (XSS) vulnerability has been identified in the Angular Template Compiler. The vulnerability exists because Angular’s internal sanitization schema fails to recognize the href and xlink:href attributes of SVG <script> elements as a Resource URL context. This issue has been patched in versions 19.2.18, 20.3.16, 21.0.7, and 21.1.0-rc.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.5HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CPE Matches

angular
angular
>>angular>>Versions up to 18.2.14(inclusive)
cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:*
angular
angular
>>angular>>Versions from 19.0.0(inclusive) to 19.2.18(exclusive)
cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:*
angular
angular
>>angular>>Versions from 20.0.0(inclusive) to 20.3.16(exclusive)
cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:*
angular
angular
>>angular>>Versions from 21.0.0(inclusive) to 21.0.7(exclusive)
cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:*
angular
angular
>>angular>>21.1.0
cpe:2.3:a:angular:angular:21.1.0:next0:*:*:*:node.js:*:*
angular
angular
>>angular>>21.1.0
cpe:2.3:a:angular:angular:21.1.0:next1:*:*:*:node.js:*:*
angular
angular
>>angular>>21.1.0
cpe:2.3:a:angular:angular:21.1.0:next2:*:*:*:node.js:*:*
angular
angular
>>angular>>21.1.0
cpe:2.3:a:angular:angular:21.1.0:next3:*:*:*:node.js:*:*
angular
angular
>>angular>>21.1.0
cpe:2.3:a:angular:angular:21.1.0:next4:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarysecurity-advisories@github.com
CWE ID: CWE-79
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/angular/angular/commit/91dc91bae4a1bbefc58bef6ef739d0e02ab44d56security-advisories@github.com
Patch
https://github.com/angular/angular/pull/66318security-advisories@github.com
Issue Tracking
https://github.com/angular/angular/security/advisories/GHSA-jrmj-c5cx-3cw6security-advisories@github.com
Vendor Advisory
Mitigation
Hyperlink: https://github.com/angular/angular/commit/91dc91bae4a1bbefc58bef6ef739d0e02ab44d56
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/angular/angular/pull/66318
Source: security-advisories@github.com
Resource:
Issue Tracking
Hyperlink: https://github.com/angular/angular/security/advisories/GHSA-jrmj-c5cx-3cw6
Source: security-advisories@github.com
Resource:
Vendor Advisory
Mitigation
Change History
0Changes found

Details not found