Back to list

Angular Expressions - Remote Code Execution using filters — CVE-2026-44643

GitHub · GitHub · CVE-2026-44643

ID
CVE-2026-44643
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
critical
CVSS
9.3
EPSS
0.00078

Summary

## Impact An attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. Example of vulnerable code: ``` const expressions = require("angular-expressions"); const result = expressions.compile("a | __proto__")({}, {}); ``` This should throw the error : Filter '__proto__' is not defined, however, this shows : Uncaught SyntaxError: Unexpected identifier 'Object' With a…

Product

npm: angular-expressions

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories