Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to 1.5.2, an attacker can write a malicious expression using filters that escapes the sandbox to execute arbitrary code on the system. This vulnerability is fixed in 1.5.2.
History

Mon, 11 May 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Peerigon
Peerigon angular-expressions
Vendors & Products Peerigon
Peerigon angular-expressions
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to 1.5.2, an attacker can write a malicious expression using filters that escapes the sandbox to execute arbitrary code on the system. This vulnerability is fixed in 1.5.2.
Title Angular Expressions - Remote Code Execution using filters
Weaknesses CWE-95
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-11T16:22:58.556Z

Reserved: 2026-05-07T15:30:10.875Z

Link: CVE-2026-44643

cve-icon Vulnrichment

Updated: 2026-05-11T16:22:53.227Z

cve-icon NVD

Status : Received

Published: 2026-05-11T16:17:36.143

Modified: 2026-05-11T16:17:36.143

Link: CVE-2026-44643

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T17:15:40Z