Description
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
Recommendation
No fix is available yet. Followings are affected versions:
- >= 1.3.0, <= 1.8.3
References
- GHSA-4w4v-5hc9-xrr2
- security.snyk.io
- stackblitz.com
- support.herodevs.com
- lists.debian.org
- CVE-2024-21490
- CWE-1333
- CAPEC-310
- OWASP 2021-A6
Related Issues
- StudioCMS has Authorization Bypass Through User-Controlled Key - CVE-2026-24134
- Angular vulnerable to Cross-site Scripting - CVE-2020-7676
- angular Prototype Pollution vulnerability - CVE-2019-10768
- AngularJS allows attackers to bypass common image source restrictions (GHSA-mqm9-c95h-x2p6) - CVE-2024-8373
- Tags:
- npm
- angular
Anything's wrong? Let us know Last updated on November 03, 2025