<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-44643 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44643/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 16:22:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44643/feed.xml" rel="self" type="application/rss+xml"/><item><title>Angular Expressions Remote Code Execution via Malicious Filter</title><link>https://feed.craftedsignal.io/briefs/2026-05-angular-expression-rce/</link><pubDate>Mon, 11 May 2026 16:22:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-angular-expression-rce/</guid><description>A remote code execution vulnerability (CVE-2026-44643) exists in angular-expressions versions 1.5.1 and earlier, allowing an attacker to execute arbitrary code on the system by crafting a malicious expression that bypasses the sandbox.</description><content:encoded><![CDATA[<p>The <code>angular-expressions</code> library, up to version 1.5.1, is vulnerable to remote code execution. This vulnerability, identified as CVE-2026-44643, allows an attacker to craft a malicious expression that escapes the sandbox environment of the library. By exploiting this flaw, an attacker can execute arbitrary code on the system where the vulnerable library is used. This poses a significant risk to applications utilizing <code>angular-expressions</code> for expression evaluation, potentially leading to complete system compromise. The vulnerability was discovered by San Gil from SecurityOffice. Version 1.5.2 of <code>angular-expressions</code> contains the fix.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an application using a vulnerable version (&lt;= 1.5.1) of the <code>angular-expressions</code> library.</li>
<li>The attacker crafts a malicious expression designed to exploit the sandbox escape vulnerability.</li>
<li>The attacker injects the malicious expression into the application, potentially through user input or other application logic.</li>
<li>The application uses the <code>expressions.compile()</code> function to compile the malicious expression. For example: <code>expressions.compile(&quot;a | __proto__&quot;)({}, {})</code></li>
<li>The vulnerable <code>angular-expressions</code> library fails to properly sanitize the expression, allowing it to bypass the sandbox restrictions.</li>
<li>The expression gains access to underlying JavaScript engine internals (e.g., <code>__proto__</code>).</li>
<li>The attacker leverages this access to execute arbitrary code on the server.</li>
<li>This arbitrary code execution could lead to complete compromise of the affected system, including data exfiltration, service disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the system hosting the application utilizing the vulnerable <code>angular-expressions</code> library. This can lead to complete system compromise, including data exfiltration, installation of malware, or denial of service. The severity is critical due to the potential for unauthenticated remote code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>angular-expressions</code> library to version 1.5.2 or later to patch CVE-2026-44643.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2026-44643 Exploitation — angular-expressions Sandbox Escape</code> to detect attempts to exploit the vulnerability in web server logs.</li>
<li>Implement input validation to prevent the injection of malicious expressions into applications using <code>angular-expressions</code>.</li>
<li>Continuously monitor web server logs for suspicious activity related to expression compilation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>angular-expressions</category><category>cve-2026-44643</category></item></channel></rss>