Cyber Posture

CVE-2026-44643

CriticalRCE

Published: 11 May 2026

Published
11 May 2026
Modified
13 May 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0011 28.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-44643 is a critical-severity Eval Injection (CWE-95) vulnerability in Peerigon Angular-Expressions. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 28.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Sandbox escape in AngularJS expression evaluation directly enables client-side arbitrary code execution via malicious input (CWE-95).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to 1.5.2, an attacker can write a malicious expression using filters that escapes the sandbox to execute arbitrary code on the system. This vulnerability is fixed…

more

in 1.5.2.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

peerigon
angular-expressions
≤ 1.5.2

CVEs Like This One

CVE-2025-8420Shared CWE-95
CVE-2026-28370Shared CWE-95
CVE-2024-10633Shared CWE-95
CVE-2025-50187Shared CWE-95
CVE-2025-27603Shared CWE-95
CVE-2026-4851Shared CWE-95
CVE-2026-35002Shared CWE-95
CVE-2026-33618Shared CWE-95
CVE-2026-29091Shared CWE-95
CVE-2025-0868Shared CWE-95

References