angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0499 | angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code. |
Github GHSA |
GHSA-mhp6-pxh8-r675 | Angular vulnerable to Cross-site Scripting |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 20 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Angularjs angularjs
|
|
| CPEs | cpe:2.3:a:angularjs:angularjs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Angularjs angular.js
|
Angularjs angularjs
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T09:41:01.655Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7676
No data.
Status : Modified
Published: 2020-06-08T14:15:13.133
Modified: 2025-11-20T18:00:14.787
Link: CVE-2020-7676
OpenCVE Enrichment
No data.
EUVD
Github GHSA