CVE-2025-0716

4.8 MEDIUM

📋 TL;DR

This AngularJS vulnerability allows attackers to bypass image source restrictions by manipulating SVG 'href' and 'xlink:href' attributes, enabling content spoofing and potential performance degradation. All versions of AngularJS are affected, and since AngularJS is end-of-life, no official patches will be released.

💻 Affected Systems

Products:
  • AngularJS
Versions: All versions
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: AngularJS reached end-of-life on December 31, 2021 and will not receive security updates.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could spoof legitimate content, trick users into interacting with malicious elements, and degrade application performance with resource-intensive images.

🟠

Likely Case

Content spoofing attacks where attackers display misleading images or content within the application interface.

🟢

If Mitigated

Limited impact with proper input validation and content security policies in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept code is publicly available, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://docs.angularjs.org/misc/version-support-status

Restart Required: No

Instructions:

No official patch available due to AngularJS end-of-life status. Consider migrating to supported Angular versions or implementing workarounds.

🔧 Temporary Workarounds

Input Sanitization Enhancement

all

Implement custom sanitization for SVG image elements to validate and sanitize href attributes

Implement custom $sanitize provider or use third-party sanitization libraries

Content Security Policy

all

Implement strict Content Security Policy to restrict image sources

Add Content-Security-Policy header with img-src directive

🧯 If You Can't Patch

  • Migrate from AngularJS to supported Angular versions (Angular 2+)
  • Implement network-level controls and WAF rules to detect and block malicious SVG content

🔍 How to Verify

Check if Vulnerable:

Check if application uses AngularJS and allows user-controlled SVG content with image elements

Check Version:

Check AngularJS version in application dependencies or package.json

Verify Fix Applied:

Test that SVG image href attributes are properly sanitized and restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads
  • Large image requests from unexpected sources
  • Content spoofing reports from users

Network Indicators:

  • Unusual image loading patterns
  • Requests to unexpected image domains

SIEM Query:

Search for SVG file uploads containing image elements with external href attributes

🔗 References

📤 Share & Export