{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-66035","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-11-21T01:08:02.615Z","datePublished":"2025-11-26T22:18:35.692Z","dateUpdated":"2025-11-28T18:29:18.578Z"},"containers":{"cna":{"title":"Angular HTTP Client Has XSRF Token Leakage via Protocol-Relative URLs","problemTypes":[{"descriptions":[{"cweId":"CWE-201","lang":"en","description":"CWE-201: Insertion of Sensitive Information Into Sent Data","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-359","lang":"en","description":"CWE-359: Exposure of Private Personal Information to an Unauthorized Actor","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/angular/angular/security/advisories/GHSA-58c5-g7wp-6w37","tags":["x_refsource_CONFIRM"],"url":"https://github.com/angular/angular/security/advisories/GHSA-58c5-g7wp-6w37"},{"name":"https://github.com/angular/angular/commit/0276479e7d0e280e0f8d26fa567d3b7aa97a516f","tags":["x_refsource_MISC"],"url":"https://github.com/angular/angular/commit/0276479e7d0e280e0f8d26fa567d3b7aa97a516f"},{"name":"https://github.com/angular/angular/commit/05fe6686a97fa0bcd3cf157805b3612033f975bc","tags":["x_refsource_MISC"],"url":"https://github.com/angular/angular/commit/05fe6686a97fa0bcd3cf157805b3612033f975bc"},{"name":"https://github.com/angular/angular/commit/3240d856d942727372a705252f7c8c115394a41e","tags":["x_refsource_MISC"],"url":"https://github.com/angular/angular/commit/3240d856d942727372a705252f7c8c115394a41e"},{"name":"https://github.com/angular/angular/releases/tag/19.2.16","tags":["x_refsource_MISC"],"url":"https://github.com/angular/angular/releases/tag/19.2.16"},{"name":"https://github.com/angular/angular/releases/tag/20.3.14","tags":["x_refsource_MISC"],"url":"https://github.com/angular/angular/releases/tag/20.3.14"},{"name":"https://github.com/angular/angular/releases/tag/21.0.1","tags":["x_refsource_MISC"],"url":"https://github.com/angular/angular/releases/tag/21.0.1"}],"affected":[{"vendor":"angular","product":"angular","versions":[{"version":">= 21.0.0-next.0, < 21.0.1","status":"affected"},{"version":">= 20.0.0-next.0, < 20.3.14","status":"affected"},{"version":"< 19.2.16","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-11-26T22:18:35.692Z"},"descriptions":[{"lang":"en","value":"Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs."}],"source":{"advisory":"GHSA-58c5-g7wp-6w37","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-28T18:28:53.883453Z","id":"CVE-2025-66035","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-28T18:29:18.578Z"}}]}}