Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain

Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain

Posted on November 27, 2025November 27, 2025 By CWS

A vital safety vulnerability has been found within the Angular framework that might enable attackers to steal delicate person safety tokens.

The vulnerability, tracked as CVE-2025-66035, impacts the Angular HttpClient and includes the unintentional leakage of Cross-Web site Request Forgery (XSRF) tokens.

Angular functions use a built-in safety mechanism to stop Cross-Web site Request Forgery (CSRF) assaults.

Angular HTTP Consumer Vulnerability

This technique works by assigning a secret “token” to a person’s session. At any time when the appliance sends a request to the server, it consists of this token to show the request is official.

The flaw lies in Angular’s dedication of whether or not a request is secure. The system checks vacation spot URLs to find out whether or not to connect this secret token.

Sadly, the logic incorrectly recognized URLs beginning with // (protocol-relative URLs) as “same-origin” or native requests.

FieldValueCVE IDCVE-2025-66035Vulnerability TypeCredential Leak / XSRF Token ExposureCVSS Score7.5 Assault VectorNetworkCWE IdentifiersCWE-201 (Insertion of Delicate Data Into Despatched Knowledge), CWE-359 (Publicity of Personal Private Data)ImpactAllows attackers to seize XSRF tokens and bypass CSRF protections to carry out unauthorized actions on behalf of victims

Suppose a developer inadvertently makes use of a protocol-relative URL (e.g., //attacker.com) in an HTTP request. In that case, Angular mistakenly treats it as a legitimate URL and sends the person’s secret XSRF token to that exterior area.

Suppose an attacker efficiently methods the appliance into sending a request to a website they management. In that case, they’ll seize the person’s legitimate XSRF token.

Cvn With this stolen key, the attacker can bypass CSRF protections solely. This permits them to carry out unauthorized actions on the sufferer’s behalf, resembling altering account settings or submitting fraudulent transactions.

The vulnerability impacts a number of variations of the framework. The next desk outlines the affected variations and the required updates.

Growth groups utilizing Angular ought to improve to the patched variations instantly to make sure their functions are safe.

If an instantaneous improve shouldn’t be attainable, a workaround is accessible. Builders should guarantee their code avoids utilizing protocol-relative URLs (beginning with //).

As a substitute, all backend requests ought to use relative paths (beginning with /) or totally certified absolute URLs (beginning with 

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Angular, AttackerControlled, Client, Domain, Exposes, HTTP, Token, Vulnerability, XSRF

Post navigation

Previous Post: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
Next Post: Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps

Related Posts

MuddyWater APT Weaponizing Word Documents to Deliver ‘RustyWater’ Toolkit Evading AV and EDR Tools MuddyWater APT Weaponizing Word Documents to Deliver ‘RustyWater’ Toolkit Evading AV and EDR Tools Cyber Security News
Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls Cyber Security News
AppGuard Critiques AI Defenses & Expands Insider Release AppGuard Critiques AI Defenses & Expands Insider Release Cyber Security News
48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild Cyber Security News
YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News