Angular platform-server SSRF via Hostname Hijacking (CVE-2026-46417)
A server-side request forgery (SSRF) vulnerability exists in `@angular/platform-server` due to improper processing of the request URL by the server-side rendering engine, allowing attackers to redirect relative HTTP requests to attacker-controlled servers, potentially exposing internal APIs or metadata services; patch CVE-2026-46417 immediately.
A Server-Side Request Forgery (SSRF) vulnerability has been identified in @angular/platform-server. This vulnerability arises from the server-side rendering (SSR) engine’s handling of request URLs. When an absolute-form URL (e.g., http://evil.com) is provided to the rendering engine, the internal ServerPlatformLocation can be manipulated. This manipulation allows an attacker to set the hostname to an attacker-controlled domain. This issue impacts versions of @angular/platform-server prior to the patched versions: 22.0.0-next.12, 21.2.13, 20.3.21, and 19.2.22 and also impacts versions <= 18.2.14. This vulnerability enables the redirection of relative HttpClient requests and PlatformLocation.hostname references to the attacker’s server, potentially exposing internal APIs or metadata services.
Attack Chain
- The attacker crafts a malicious URL with an absolute form (e.g.,
http://evil.com). - This malicious URL is passed to the
@angular/platform-serverrendering engine’s entry points (renderModuleorrenderApplication). - The
ServerPlatformLocationinternal component processes the URL. - Due to the vulnerability,
ServerPlatformLocationis manipulated to adopt the attacker-controlled domain (evil.com) as the “current” hostname. - The Angular application, during server-side rendering, makes a relative
HttpClientrequest (e.g.,/api/internal). - This relative request, intended for the legitimate server, is now redirected to
http://evil.com/api/internal. - The attacker’s server receives the redirected request, potentially containing sensitive information.
- The attacker gains unauthorized access to internal APIs or metadata services through the redirected request.
Impact
Successful exploitation of this SSRF vulnerability (CVE-2026-46417) can lead to the exposure of sensitive internal APIs and metadata services. An attacker could potentially gain access to confidential data, modify application settings, or perform unauthorized actions on behalf of the server. This can lead to data breaches, system compromise, and reputational damage.
Recommendation
- Upgrade to the patched versions of
@angular/platform-server: 22.0.0-next.12, 21.2.13, 20.3.21, or 19.2.22 to mitigate the vulnerability as noted in the advisory. - For developers unable to update immediately, implement strict URL validation in their server entry point (e.g.,
server.ts) as suggested in the advisory. - Deploy the Sigma rule “Detect Angular platform-server SSRF via Hostname Hijacking (CVE-2026-46417)” to detect potential exploitation attempts by monitoring server logs.
Detection coverage 2
Detect Angular platform-server SSRF via Hostname Hijacking (CVE-2026-46417)
highDetects CVE-2026-46417 exploitation — attempts to pass absolute URLs to the Angular platform-server renderModule or renderApplication functions.
Detect Suspicious Host Header - Angular SSRF (CVE-2026-46417)
mediumDetects CVE-2026-46417 exploitation — attempts to manipulate the Host header with attacker-controlled domains.
Detection queries are available on the platform. Get full rules →