CVE-2026-25149: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in QwikDev qwik
CVE-2026-25149 is an Open Redirect vulnerability in QwikDev's Qwik JavaScript framework versions prior to 1. 19. 0. The flaw exists in Qwik City's default request handler middleware, allowing attackers to redirect users to arbitrary protocol-relative URLs. Exploiting this vulnerability enables attackers to craft phishing links that appear to originate from trusted domains but redirect victims to malicious sites. The vulnerability has a low CVSS score of 2. 7 and does not require user interaction or authentication. Although no known exploits are currently in the wild, unpatched systems remain at risk. The issue was patched in version 1. 19.
AI Analysis
Technical Summary
CVE-2026-25149 is an Open Redirect vulnerability classified under CWE-601 affecting QwikDev's Qwik JavaScript framework, specifically versions prior to 1.19.0. The vulnerability resides in Qwik City's default request handler middleware, which improperly handles URL redirection by allowing attackers to specify arbitrary protocol-relative URLs. This flaw enables remote attackers to craft URLs that appear to originate from legitimate, trusted domains but redirect users to attacker-controlled sites. Such redirection can be leveraged in phishing campaigns to deceive users into divulging sensitive information or downloading malware. The vulnerability does not require any authentication or user interaction to be exploited, and the attack vector is network-based. The CVSS 4.0 base score is 2.7, indicating low severity, primarily because the impact is limited to user redirection without direct compromise of confidentiality, integrity, or availability of the affected system. The vulnerability was publicly disclosed and patched in Qwik version 1.19.0, and no known exploits have been reported in the wild to date. Organizations using Qwik versions earlier than 1.19.0 should prioritize upgrading to mitigate this risk.
Potential Impact
For European organizations, the primary impact of this vulnerability is an increased risk of successful phishing attacks leveraging trusted domain names. Attackers can exploit the open redirect to craft convincing URLs that redirect users to malicious sites, potentially leading to credential theft, malware infection, or social engineering attacks. While the vulnerability itself does not allow direct system compromise, the downstream effects of phishing can be severe, including data breaches and financial fraud. Organizations relying on Qwik for web applications, especially those serving customers or employees in Europe, may face reputational damage and regulatory scrutiny if phishing attacks succeed. The low CVSS score reflects limited direct technical impact, but the social engineering risk is non-negligible. The threat is more pronounced in sectors with high user interaction such as finance, e-commerce, and public services.
Mitigation Recommendations
The most effective mitigation is to upgrade all Qwik framework instances to version 1.19.0 or later, where the vulnerability is patched. Organizations should audit their web applications to identify any usage of Qwik versions prior to 1.19.0 and prioritize updates. Additionally, implement strict URL validation and sanitization in custom middleware or routing logic to prevent open redirects. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns. Educate users about phishing risks and encourage verification of URLs before clicking. Monitor logs for unusual redirect activities and conduct regular security assessments of web applications. For organizations unable to upgrade immediately, consider temporary mitigations such as disabling or restricting redirect functionality in Qwik City's middleware if feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Poland
CVE-2026-25149: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in QwikDev qwik
Description
CVE-2026-25149 is an Open Redirect vulnerability in QwikDev's Qwik JavaScript framework versions prior to 1. 19. 0. The flaw exists in Qwik City's default request handler middleware, allowing attackers to redirect users to arbitrary protocol-relative URLs. Exploiting this vulnerability enables attackers to craft phishing links that appear to originate from trusted domains but redirect victims to malicious sites. The vulnerability has a low CVSS score of 2. 7 and does not require user interaction or authentication. Although no known exploits are currently in the wild, unpatched systems remain at risk. The issue was patched in version 1. 19.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25149 is an Open Redirect vulnerability classified under CWE-601 affecting QwikDev's Qwik JavaScript framework, specifically versions prior to 1.19.0. The vulnerability resides in Qwik City's default request handler middleware, which improperly handles URL redirection by allowing attackers to specify arbitrary protocol-relative URLs. This flaw enables remote attackers to craft URLs that appear to originate from legitimate, trusted domains but redirect users to attacker-controlled sites. Such redirection can be leveraged in phishing campaigns to deceive users into divulging sensitive information or downloading malware. The vulnerability does not require any authentication or user interaction to be exploited, and the attack vector is network-based. The CVSS 4.0 base score is 2.7, indicating low severity, primarily because the impact is limited to user redirection without direct compromise of confidentiality, integrity, or availability of the affected system. The vulnerability was publicly disclosed and patched in Qwik version 1.19.0, and no known exploits have been reported in the wild to date. Organizations using Qwik versions earlier than 1.19.0 should prioritize upgrading to mitigate this risk.
Potential Impact
For European organizations, the primary impact of this vulnerability is an increased risk of successful phishing attacks leveraging trusted domain names. Attackers can exploit the open redirect to craft convincing URLs that redirect users to malicious sites, potentially leading to credential theft, malware infection, or social engineering attacks. While the vulnerability itself does not allow direct system compromise, the downstream effects of phishing can be severe, including data breaches and financial fraud. Organizations relying on Qwik for web applications, especially those serving customers or employees in Europe, may face reputational damage and regulatory scrutiny if phishing attacks succeed. The low CVSS score reflects limited direct technical impact, but the social engineering risk is non-negligible. The threat is more pronounced in sectors with high user interaction such as finance, e-commerce, and public services.
Mitigation Recommendations
The most effective mitigation is to upgrade all Qwik framework instances to version 1.19.0 or later, where the vulnerability is patched. Organizations should audit their web applications to identify any usage of Qwik versions prior to 1.19.0 and prioritize updates. Additionally, implement strict URL validation and sanitization in custom middleware or routing logic to prevent open redirects. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns. Educate users about phishing risks and encourage verification of URLs before clicking. Monitor logs for unusual redirect activities and conduct regular security assessments of web applications. For organizations unable to upgrade immediately, consider temporary mitigations such as disabling or restricting redirect functionality in Qwik City's middleware if feasible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-29T15:39:11.821Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698268e3f9fa50a62fe1ecba
Added to database: 2/3/2026, 9:30:11 PM
Last enriched: 2/11/2026, 11:46:36 AM
Last updated: 3/24/2026, 12:37:42 AM
Views: 128
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.