Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25149: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in QwikDev qwik

0
Low
VulnerabilityCVE-2026-25149cvecve-2026-25149cwe-601
Published: Tue Feb 03 2026 (02/03/2026, 21:11:55 UTC)
Source: CVE Database V5
Vendor/Project: QwikDev
Product: qwik

Description

CVE-2026-25149 is an Open Redirect vulnerability in QwikDev's Qwik JavaScript framework versions prior to 1. 19. 0. The flaw exists in Qwik City's default request handler middleware, allowing attackers to redirect users to arbitrary protocol-relative URLs. Exploiting this vulnerability enables attackers to craft phishing links that appear to originate from trusted domains but redirect victims to malicious sites. The vulnerability has a low CVSS score of 2. 7 and does not require user interaction or authentication. Although no known exploits are currently in the wild, unpatched systems remain at risk. The issue was patched in version 1. 19.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:46:36 UTC

Technical Analysis

CVE-2026-25149 is an Open Redirect vulnerability classified under CWE-601 affecting QwikDev's Qwik JavaScript framework, specifically versions prior to 1.19.0. The vulnerability resides in Qwik City's default request handler middleware, which improperly handles URL redirection by allowing attackers to specify arbitrary protocol-relative URLs. This flaw enables remote attackers to craft URLs that appear to originate from legitimate, trusted domains but redirect users to attacker-controlled sites. Such redirection can be leveraged in phishing campaigns to deceive users into divulging sensitive information or downloading malware. The vulnerability does not require any authentication or user interaction to be exploited, and the attack vector is network-based. The CVSS 4.0 base score is 2.7, indicating low severity, primarily because the impact is limited to user redirection without direct compromise of confidentiality, integrity, or availability of the affected system. The vulnerability was publicly disclosed and patched in Qwik version 1.19.0, and no known exploits have been reported in the wild to date. Organizations using Qwik versions earlier than 1.19.0 should prioritize upgrading to mitigate this risk.

Potential Impact

For European organizations, the primary impact of this vulnerability is an increased risk of successful phishing attacks leveraging trusted domain names. Attackers can exploit the open redirect to craft convincing URLs that redirect users to malicious sites, potentially leading to credential theft, malware infection, or social engineering attacks. While the vulnerability itself does not allow direct system compromise, the downstream effects of phishing can be severe, including data breaches and financial fraud. Organizations relying on Qwik for web applications, especially those serving customers or employees in Europe, may face reputational damage and regulatory scrutiny if phishing attacks succeed. The low CVSS score reflects limited direct technical impact, but the social engineering risk is non-negligible. The threat is more pronounced in sectors with high user interaction such as finance, e-commerce, and public services.

Mitigation Recommendations

The most effective mitigation is to upgrade all Qwik framework instances to version 1.19.0 or later, where the vulnerability is patched. Organizations should audit their web applications to identify any usage of Qwik versions prior to 1.19.0 and prioritize updates. Additionally, implement strict URL validation and sanitization in custom middleware or routing logic to prevent open redirects. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns. Educate users about phishing risks and encourage verification of URLs before clicking. Monitor logs for unusual redirect activities and conduct regular security assessments of web applications. For organizations unable to upgrade immediately, consider temporary mitigations such as disabling or restricting redirect functionality in Qwik City's middleware if feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.821Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698268e3f9fa50a62fe1ecba

Added to database: 2/3/2026, 9:30:11 PM

Last enriched: 2/11/2026, 11:46:36 AM

Last updated: 3/24/2026, 12:37:42 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses