Vulnerable Library - compiler-19.2.18.tgz
Angular - the compiler library
Library home page: https://registry.npmjs.org/@angular/compiler/-/compiler-19.2.18.tgz
Path to dependency file: /dgrv4_Gateway_serv/srcAngular/package.json
Path to vulnerable library: /dgrv4_Gateway_serv/srcAngular/package.json
Vulnerabilities
| Vulnerability |
Severity |
CVSS |
Dependency |
Type |
Fixed in (compiler version) |
Remediation Possible** |
| CVE-2026-32635 |
High |
8.0 |
compiler-19.2.18.tgz |
Direct |
@angular/compiler - 21.2.4,@angular/compiler - 19.2.20,@angular/compiler - 20.3.18,@angular/core - 20.3.18,@angular/core - 21.2.4,@angular/core - 22.0.0-next.3,@angular/core - 19.2.20,@angular/compiler - 22.0.0-next.3 |
❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2026-32635
Vulnerable Library - compiler-19.2.18.tgz
Angular - the compiler library
Library home page: https://registry.npmjs.org/@angular/compiler/-/compiler-19.2.18.tgz
Path to dependency file: /dgrv4_Gateway_serv/srcAngular/package.json
Path to vulnerable library: /dgrv4_Gateway_serv/srcAngular/package.json
Dependency Hierarchy:
- ❌ compiler-19.2.18.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, a Cross-Site Scripting (XSS) vulnerability has been identified in the Angular runtime and compiler. It occurs when the application uses a security-sensitive attribute (for example href on an anchor tag) together with Angular's ability to internationalize attributes. Enabling internationalization for the sensitive attribute by adding i18n- name bypasses Angular's built-in sanitization mechanism, which when combined with a data binding to untrusted user-generated data can allow an attacker to inject a malicious script. This vulnerability is fixed in 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20.
Publish Date: 2026-03-13
URL: CVE-2026-32635
CVSS 3 Score Details (8.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-g93w-mfhg-p222
Release Date: 2026-03-13
Fix Resolution: @angular/compiler - 21.2.4,@angular/compiler - 19.2.20,@angular/compiler - 20.3.18,@angular/core - 20.3.18,@angular/core - 21.2.4,@angular/core - 22.0.0-next.3,@angular/core - 19.2.20,@angular/compiler - 22.0.0-next.3
Step up your Open Source Security Game with Mend here
Angular - the compiler library
Library home page: https://registry.npmjs.org/@angular/compiler/-/compiler-19.2.18.tgz
Path to dependency file: /dgrv4_Gateway_serv/srcAngular/package.json
Path to vulnerable library: /dgrv4_Gateway_serv/srcAngular/package.json
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - compiler-19.2.18.tgz
Angular - the compiler library
Library home page: https://registry.npmjs.org/@angular/compiler/-/compiler-19.2.18.tgz
Path to dependency file: /dgrv4_Gateway_serv/srcAngular/package.json
Path to vulnerable library: /dgrv4_Gateway_serv/srcAngular/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, a Cross-Site Scripting (XSS) vulnerability has been identified in the Angular runtime and compiler. It occurs when the application uses a security-sensitive attribute (for example href on an anchor tag) together with Angular's ability to internationalize attributes. Enabling internationalization for the sensitive attribute by adding i18n- name bypasses Angular's built-in sanitization mechanism, which when combined with a data binding to untrusted user-generated data can allow an attacker to inject a malicious script. This vulnerability is fixed in 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20.
Publish Date: 2026-03-13
URL: CVE-2026-32635
CVSS 3 Score Details (8.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: GHSA-g93w-mfhg-p222
Release Date: 2026-03-13
Fix Resolution: @angular/compiler - 21.2.4,@angular/compiler - 19.2.20,@angular/compiler - 20.3.18,@angular/core - 20.3.18,@angular/core - 21.2.4,@angular/core - 22.0.0-next.3,@angular/core - 19.2.20,@angular/compiler - 22.0.0-next.3
Step up your Open Source Security Game with Mend here