The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-66412

CVE-2025-66412: Angular Template Compiler XSS Vulnerability

CVE-2025-66412 is a stored XSS flaw in Angular Template Compiler that bypasses security sanitization through incomplete schema validation. This article covers technical details, affected versions, security impact, and patches.

Updated: January 22, 2026

CVE-2025-66412 Overview

A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. Angular is a popular development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. This vulnerability occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization mechanisms.

Specifically, the schema fails to classify certain URL-holding attributes (such as those that could contain javascript: URLs) as requiring strict URL security, enabling the injection and execution of malicious scripts. This vulnerability affects Angular versions prior to 21.0.2, 20.3.15, and 19.2.17.

Critical Impact

This HIGH severity XSS vulnerability (CVSS 8.5) allows attackers to bypass Angular's security sanitization and inject malicious JavaScript through URL-holding attributes, potentially leading to session hijacking, data theft, and unauthorized actions on behalf of authenticated users.

Affected Products

  • Angular versions prior to 21.0.2
  • Angular versions prior to 20.3.15
  • Angular versions prior to 19.2.17

Discovery Timeline

  • 2025-12-01 - CVE-2025-66412 published to NVD
  • 2025-12-02 - Last updated in NVD database

Technical Details for CVE-2025-66412

Vulnerability Analysis

This vulnerability is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation - Cross-Site Scripting). The flaw resides within Angular's Template Compiler, specifically in its internal security schema that determines which HTML attributes require sanitization.

Angular employs a security context system to protect against XSS attacks by sanitizing potentially dangerous values. However, the internal schema used by the template compiler was found to be incomplete. Certain HTML attributes that can hold URL values were not properly marked as requiring URL security context validation.

With a CVSS 4.0 score of 8.5 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N), this vulnerability has a network attack vector with low complexity, requires low privileges, and requires user interaction. Successful exploitation can result in high impacts to confidentiality, integrity, and availability.

The EPSS (Exploit Prediction Scoring System) data indicates a probability of 0.052% with a percentile ranking of 16.362 as of 2025-12-16.

Root Cause

The root cause lies in an incomplete security schema within Angular's Template Compiler. The compiler maintains an internal mapping of HTML attributes to their required security contexts (such as URL, Resource URL, HTML, Script, and Style). When this schema fails to classify certain URL-holding attributes correctly, values assigned to these attributes bypass the strict URL sanitization that would normally prevent javascript: protocol URLs from being rendered.

This oversight allows malicious payloads containing javascript: URLs to be stored and subsequently executed when other users interact with the affected content.

Attack Vector

The attack vector for CVE-2025-66412 is network-based and requires the following conditions:

  1. Low Privileges Required: An attacker needs at least basic access to submit content to the application
  2. User Interaction: A victim must interact with the malicious content (e.g., clicking a link)
  3. Stored XSS Context: The malicious payload is stored server-side and served to other users

An attacker exploits this vulnerability by injecting a javascript: URL into an HTML attribute that the Angular Template Compiler's security schema does not recognize as requiring URL sanitization. When the compiled template renders in a victim's browser, the malicious script executes within the security context of the vulnerable application.

The vulnerability mechanism involves attributes that can contain URLs but were not included in Angular's security schema. When a template binds user-controlled data to these attributes without proper sanitization, attackers can inject executable JavaScript payloads. For detailed technical analysis, refer to the GitHub Security Advisory GHSA-v4hv-rgfq-gp49.

Detection Methods for CVE-2025-66412

Indicators of Compromise

  • Presence of javascript: protocol URLs in HTML attributes within stored application data
  • Unusual JavaScript execution events triggered from unexpected DOM attribute sources
  • User reports of unexpected behavior or pop-ups when viewing application content
  • Server logs showing submission of content containing javascript: URL schemes in attribute values

Detection Strategies

Static Code Analysis: Review Angular templates for dynamic binding to URL-holding attributes that may not be properly sanitized. Use static analysis tools to identify template bindings that could be vulnerable.

Dependency Scanning: Implement automated dependency scanning in CI/CD pipelines to detect vulnerable Angular versions. Flag any Angular packages with versions prior to 21.0.2, 20.3.15, or 19.2.17.

Content Security Policy Monitoring: Implement strict Content Security Policy (CSP) headers and monitor for CSP violation reports, which can indicate attempted XSS exploitation.

Web Application Firewall Rules: Configure WAF rules to detect and block requests containing javascript: protocol strings in parameters that could be bound to template attributes.

Monitoring Recommendations

Organizations should implement comprehensive logging for user-submitted content, particularly monitoring for patterns associated with XSS payloads. Enable browser-side CSP reporting to capture attempted script injections. SentinelOne's Singularity platform provides real-time behavioral analysis that can detect anomalous script execution patterns indicative of XSS exploitation attempts.

Consider implementing runtime application self-protection (RASP) solutions to monitor and block malicious JavaScript execution at the application layer.

How to Mitigate CVE-2025-66412

Immediate Actions Required

  • Upgrade Angular to patched versions: 21.0.2, 20.3.15, or 19.2.17 immediately
  • Audit existing application content for potentially malicious stored payloads containing javascript: URLs
  • Implement Content Security Policy headers with strict script-src directives as a defense-in-depth measure
  • Review and restrict user permissions for content submission until patches are applied
  • Enable WAF rules to block requests containing javascript: protocol strings in user input

Patch Information

The Angular team has released security patches addressing this vulnerability in the following versions:

  • Angular 21.x: Upgrade to 21.0.2 or later
  • Angular 20.x: Upgrade to 20.3.15 or later
  • Angular 19.x: Upgrade to 19.2.17 or later

The fix is available in commit 1c6b0704fb63d051fab8acff84d076abfbc4893a. This patch updates the internal security schema to properly classify URL-holding attributes, ensuring they receive appropriate sanitization.

For complete details, see the GitHub Security Advisory.

Workarounds

If immediate patching is not possible, implement the following temporary mitigations:

bash
# Example: Implementing Content Security Policy headers in nginx
# Add to nginx server configuration block

add_header Content-Security-Policy "default-src 'self'; script-src 'self'; object-src 'none'; base-uri 'self';" always;

# Enable CSP reporting for monitoring
add_header Content-Security-Policy-Report-Only "default-src 'self'; report-uri /csp-violation-report;" always;

Additionally, implement strict input validation on the server side to reject or sanitize any content containing javascript: protocol URLs before storing it. Consider using Angular's DomSanitizer service explicitly for any user-controlled URL bindings as an additional layer of protection until the upgrade can be completed.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechAngular

  • SeverityHIGH

  • CVSS Score8.5

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-79
  • Technical References
  • Github

  • Github
  • Related CVEs
  • CVE-2026-32635: Angular Framework XSS Vulnerability

  • CVE-2026-27970: Angular i18n Pipeline XSS Vulnerability

  • CVE-2026-22610: Angular Template Compiler XSS Vulnerability

  • CVE-2026-33397: Angular SSR Open Redirect Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English