Angular Compiler v20.3.18 Patches Critical XSS Vulnerability in i18n Bindings (CVE-2026-32635)
A critical security flaw in the Angular framework has been patched, exposing applications using internationalization (i18n) to cross-site scripting (XSS) attacks. The vulnerability, tracked as CVE-2026-32635 (GHSA-g93w-mfhg-p222), resides within the `@angular/compiler` package. It specifically affects how Angular handles i18n attribute bindings, potentially allowing attackers to inject and execute malicious scripts in the context of a user's browser. This update from version 20.3.16 to 20.3.18 is a mandatory security fix for all affected projects.
The vulnerability was identified in the core Angular compiler, a fundamental component for building Angular applications. The flaw could be exploited when an application uses Angular's i18n features for translating attribute values. If unpatched, this creates a direct vector for attackers to compromise user data and session integrity. The update, managed via the Renovate dependency bot, shows high merge confidence, indicating a low risk of breaking changes, but the primary driver is the urgent need to close this security gap.
This patch places immediate pressure on development and security teams across the global Angular ecosystem to audit and update their dependencies. Any delay in applying this compiler update leaves web applications vulnerable to a well-defined XSS attack path. The disclosure follows standard security advisory protocols, but the presence of a CVE and a GitHub Security Advisory underscores the severity. Organizations must treat this as a high-priority update to mitigate the risk of client-side code injection and potential data breaches stemming from this compiler vulnerability.