Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Dec 2, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
@angular/common (source) 21.0.0 -> 21.0.1 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2025-66035

The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain.

Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header.

Impact

The token leakage completely bypasses Angular's built-in CSRF protection, allowing an attacker to capture the user's valid XSRF token. Once the token is obtained, the attacker can perform arbitrary Cross-Site Request Forgery (CSRF) attacks against the victim user's session.

Attack Preconditions

  1. The victim's Angular application must have XSRF protection enabled.
  2. The attacker must be able to make the application send a state-changing HTTP request (e.g., POST) to a protocol-relative URL (e.g., //attacker.com) that they control.

Patches

  • 19.2.16
  • 20.3.14
  • 21.0.1

Workarounds

Developers should avoid using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.


Release Notes

angular/angular (@​angular/common)

v21.0.1

Compare Source

compiler-cli
Commit Type Description
39c577bc36 fix do not type check native controls with ControlValueAccessor
8d3a89a477 fix escape angular control flow in jsdoc
bc34083d34 fix ignore non-existent files
core
Commit Type Description
0ea1e07174 fix apply bootstrap-options migration to platformBrowserDynamic
70507b8c1c fix debug data causing memory leak for root effects
a55482fca3 fix notify profiler events in case of errors
49ad7c6508 fix use injected DOCUMENT for CSP_NONCE
cc1ec09931 perf avoid repeat searches for field directive
forms
Commit Type Description
7d5c7cf99a feat add DI option for classes on Field directive
8acf5d2756 fix allow dynamic type bindings on signal form controls
de5fca94c5 fix run reset as untracked
http
Commit Type Description
3240d856d9 fix prevent XSRF token leakage to protocol-relative URLs
migrations
Commit Type Description
f394215b14 fix detect structural ngTemplateOutlet and ngComponentOutlet

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/npm-angular-common-vulnerability branch from a6f5900 to 8483d5c Compare December 3, 2025 17:34
@mnahkies mnahkies merged commit e0962e6 into main Dec 5, 2025
22 checks passed
@mnahkies mnahkies deleted the renovate/npm-angular-common-vulnerability branch December 5, 2025 08:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants