Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25148: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in QwikDev qwik

0
Medium
VulnerabilityCVE-2026-25148cvecve-2026-25148cwe-79
Published: Tue Feb 03 2026 (02/03/2026, 21:12:38 UTC)
Source: CVE Database V5
Vendor/Project: QwikDev
Product: qwik

Description

CVE-2026-25148 is a medium severity Cross-Site Scripting (XSS) vulnerability in Qwik, a JavaScript framework focused on performance. Versions prior to 1. 19. 0 are affected due to improper neutralization of input during server-side rendering of virtual attributes, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction to trigger script execution in the victim's browser within the affected origin context. This vulnerability can lead to theft of sensitive information, session hijacking, or other malicious actions performed on behalf of the user. The issue has been patched in Qwik version 1. 19. 0. European organizations using affected Qwik versions in web applications are at risk, especially those with public-facing services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:58:54 UTC

Technical Analysis

CVE-2026-25148 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Qwik JavaScript framework prior to version 1.19.0. The vulnerability arises from improper neutralization of input during server-side rendering, specifically in the serialization of virtual attributes. This flaw allows a remote attacker to inject arbitrary JavaScript code into server-rendered pages by manipulating virtual attributes, which are then rendered without sufficient sanitization. When a victim loads the affected page, the malicious script executes in the context of the vulnerable origin, potentially compromising confidentiality and integrity of user data. The vulnerability does not require authentication or privileges and can be triggered through user interaction, such as clicking a crafted link or visiting a malicious page. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction. The scope is limited to applications using vulnerable Qwik versions with server-side rendering enabled. The vulnerability has been addressed in Qwik 1.19.0 by implementing proper input sanitization and secure serialization of virtual attributes. No public exploits have been reported to date, but the vulnerability poses a risk to web applications relying on Qwik for rendering dynamic content.

Potential Impact

For European organizations, this vulnerability can lead to significant security risks including theft of session cookies, user credentials, or other sensitive information through script injection. Attackers could perform actions on behalf of users, leading to account compromise or data leakage. Public-facing web applications built with vulnerable Qwik versions are particularly at risk, potentially affecting customer trust and regulatory compliance under GDPR due to data breaches. The medium severity score indicates moderate impact, but the widespread use of JavaScript frameworks in Europe’s digital economy means a broad attack surface. Organizations in sectors such as finance, e-commerce, and government services are especially vulnerable due to the sensitive nature of their data and high-value targets for attackers. Additionally, the vulnerability could be leveraged as part of multi-stage attacks or social engineering campaigns. Although no known exploits exist currently, the ease of exploitation and lack of required privileges make timely patching critical to prevent potential compromise.

Mitigation Recommendations

1. Upgrade all Qwik framework instances to version 1.19.0 or later immediately to apply the official patch addressing this vulnerability. 2. Conduct a thorough audit of server-side rendering code to identify any custom serialization or handling of virtual attributes that may bypass framework protections. 3. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and mitigate the impact of potential XSS attacks. 4. Employ input validation and output encoding best practices in all web application components, especially those interacting with user-supplied data. 5. Monitor web application logs and user reports for suspicious activity indicative of XSS exploitation attempts. 6. Educate developers on secure coding practices related to server-side rendering and JavaScript frameworks to prevent similar vulnerabilities. 7. Consider using automated security scanning tools that can detect XSS vulnerabilities in web applications during development and deployment cycles. 8. If immediate upgrade is not feasible, apply temporary mitigations such as disabling server-side rendering of virtual attributes or sanitizing inputs at the application layer.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.821Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698268e3f9fa50a62fe1ecb6

Added to database: 2/3/2026, 9:30:11 PM

Last enriched: 2/11/2026, 11:58:54 AM

Last updated: 3/23/2026, 11:39:39 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses