The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade @angular/ssr to version 19.2.21, 20.3.17, 21.1.5, 21.2.0-rc.0 or higher.
@angular/ssr is a the Angular server side rendering utilities.
Affected versions of this package are vulnerable to Open Redirect via the internal URL processing logic when handling the X-Forwarded-Prefix header. An attacker can cause users to be redirected to arbitrary external domains by supplying a specially crafted header value containing multiple leading slashes, which is insufficiently sanitized before being used in the Location header. This can facilitate large-scale phishing and SEO hijacking attacks.
Note:
This is only exploitable if the application uses Angular SSR, has routes that perform internal redirects, the infrastructure passes the X-Forwarded-Prefix header to the SSR process without sanitization, and the cache does not vary on the X-Forwarded-Prefix header.
This vulnerability can be mitigated by sanitizing the X-Forwarded-Prefix header in the server middleware to remove all leading slashes before the Angular engine processes the request.