


Perceptive Security
SOC/SIEM Consultancy

Beghelli Sicuro24 SicuroWeb embeds AngularJS 1.5.2, an end-of-life component containing known sandbox escape primitives. When combined with template injection p…
Published:
21 april 2026 om 22:00:00
Alert date:
22 april 2026 om 22:11:22
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
Beghelli Sicuro24 SicuroWeb embeds end-of-life AngularJS 1.5.2 containing sandbox escape primitives. Combined with template injection, attackers can escape the AngularJS sandbox and achieve arbitrary JavaScript execution in operator browser sessions. This enables session hijacking, DOM manipulation, and persistent browser compromise. Network-adjacent attackers can exploit this via MITM attacks in plaintext HTTP deployments without user interaction.
Technical details
Mitigation steps:
Affected products:
Beghelli Sicuro24 SicuroWeb
AngularJS
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41468
https://github.com/kmkz/Exploits/blob/master/2026/CVE-2026-22191-POC.py
https://github.com/kmkz/Exploits/blob/master/2026/CVE-2026-22191-SicuroWeb-ATI-chain.txt
https://www.beghelli.it
https://www.boffsec-services.com/posts/sicuroweb-cve-2026-22191/
https://www.vulncheck.com/advisories/beghelli-sicuro24-sicuroweb-angularjs-sandbox-escape-via-template-injection
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
