GHSA-4p4w-6hg8-63wx

Suggest an improvement
Source
https://github.com/advisories/GHSA-4p4w-6hg8-63wx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-4p4w-6hg8-63wx/GHSA-4p4w-6hg8-63wx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4p4w-6hg8-63wx
Aliases
Published
2025-06-04T18:30:58Z
Modified
2025-06-07T00:27:15.321330Z
Downstream
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
Summary
AngularJS Incomplete Filtering of Special Elements vulnerability
Details

Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS's 'ngSanitize' module allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images.

This issue affects AngularJS versions greater than or equal to 1.3.1.

Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

Database specific
{
    "github_reviewed_at": "2025-06-06T23:38:46Z",
    "cwe_ids": [
        "CWE-791"
    ],
    "nvd_published_at": "2025-06-04T17:15:28Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

npm / angular-sanitize

Package

Affected ranges

Type
SEMVER
Events
Introduced
1.3.1
Last affected
1.8.3