CVE-2026-25151: CWE-352: Cross-Site Request Forgery (CSRF) in QwikDev qwik
CVE-2026-25151 is a Cross-Site Request Forgery (CSRF) vulnerability in QwikDev's Qwik JavaScript framework versions prior to 1. 19. 0. The issue arises from inconsistent interpretation of HTTP request headers, specifically Content-Type headers, by Qwik City's server-side request handler. This flaw allows remote attackers to bypass CSRF protections by crafting or using multi-valued Content-Type headers, potentially leading to unauthorized actions with elevated integrity impact. The vulnerability has a CVSS score of 5. 9 (medium severity) and requires user interaction but no authentication. It affects web applications built on vulnerable Qwik versions and has no known exploits in the wild yet. The issue was patched in version 1. 19.
AI Analysis
Technical Summary
CVE-2026-25151 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting QwikDev's Qwik JavaScript framework, specifically versions prior to 1.19.0. Qwik is designed for high-performance web applications, and Qwik City is its server-side request handler component. The vulnerability stems from inconsistent parsing of HTTP request headers, particularly the Content-Type header, by the server-side handler. Attackers can exploit this by sending specially crafted or multi-valued Content-Type headers that circumvent the framework's CSRF protections, which normally prevent unauthorized form submissions from malicious sites. This bypass allows attackers to perform unauthorized state-changing operations on behalf of authenticated users, impacting the integrity of affected applications. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N) indicates that the attack is network-based, requires high attack complexity, no privileges, and user interaction, with low confidentiality impact but high integrity impact and no availability impact. No known exploits have been reported in the wild, but the vulnerability is significant for applications relying on Qwik versions before 1.19.0. The issue was addressed in Qwik version 1.19.0 by correcting the header parsing logic to enforce consistent CSRF protections. Organizations using Qwik should verify their versions and apply the patch to prevent potential exploitation.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to web applications built using vulnerable versions of the Qwik framework. Successful exploitation can lead to unauthorized actions performed with the privileges of authenticated users, potentially resulting in data manipulation, unauthorized transactions, or configuration changes. While confidentiality impact is low, the integrity of critical business processes and data can be compromised, which may lead to regulatory non-compliance, reputational damage, and operational disruptions. Given the medium CVSS score and the requirement for user interaction, the threat is moderate but should not be underestimated, especially for sectors with high reliance on web applications such as finance, e-commerce, and public services. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation. Organizations failing to update may face increased risk if attackers develop exploit code leveraging this vulnerability.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Immediately identify all applications and services using Qwik framework versions prior to 1.19.0 through software inventory and dependency analysis. 2) Upgrade all affected Qwik instances to version 1.19.0 or later, which contains the patch addressing the header parsing and CSRF protection bypass. 3) Review and strengthen CSRF defenses by implementing additional server-side validation mechanisms, such as double-submit cookies or same-site cookies, to provide defense-in-depth. 4) Conduct security testing focusing on CSRF attack vectors, including attempts to exploit multi-valued or malformed Content-Type headers. 5) Educate developers and security teams about the nuances of HTTP header parsing and CSRF risks in modern JavaScript frameworks. 6) Monitor web application logs for unusual or suspicious requests involving multi-valued Content-Type headers or unexpected form submissions. 7) Implement Content Security Policy (CSP) headers to reduce the risk of malicious cross-origin requests. These targeted measures go beyond generic advice by addressing the specific nature of the vulnerability and its exploitation method.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-25151: CWE-352: Cross-Site Request Forgery (CSRF) in QwikDev qwik
Description
CVE-2026-25151 is a Cross-Site Request Forgery (CSRF) vulnerability in QwikDev's Qwik JavaScript framework versions prior to 1. 19. 0. The issue arises from inconsistent interpretation of HTTP request headers, specifically Content-Type headers, by Qwik City's server-side request handler. This flaw allows remote attackers to bypass CSRF protections by crafting or using multi-valued Content-Type headers, potentially leading to unauthorized actions with elevated integrity impact. The vulnerability has a CVSS score of 5. 9 (medium severity) and requires user interaction but no authentication. It affects web applications built on vulnerable Qwik versions and has no known exploits in the wild yet. The issue was patched in version 1. 19.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25151 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting QwikDev's Qwik JavaScript framework, specifically versions prior to 1.19.0. Qwik is designed for high-performance web applications, and Qwik City is its server-side request handler component. The vulnerability stems from inconsistent parsing of HTTP request headers, particularly the Content-Type header, by the server-side handler. Attackers can exploit this by sending specially crafted or multi-valued Content-Type headers that circumvent the framework's CSRF protections, which normally prevent unauthorized form submissions from malicious sites. This bypass allows attackers to perform unauthorized state-changing operations on behalf of authenticated users, impacting the integrity of affected applications. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N) indicates that the attack is network-based, requires high attack complexity, no privileges, and user interaction, with low confidentiality impact but high integrity impact and no availability impact. No known exploits have been reported in the wild, but the vulnerability is significant for applications relying on Qwik versions before 1.19.0. The issue was addressed in Qwik version 1.19.0 by correcting the header parsing logic to enforce consistent CSRF protections. Organizations using Qwik should verify their versions and apply the patch to prevent potential exploitation.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to web applications built using vulnerable versions of the Qwik framework. Successful exploitation can lead to unauthorized actions performed with the privileges of authenticated users, potentially resulting in data manipulation, unauthorized transactions, or configuration changes. While confidentiality impact is low, the integrity of critical business processes and data can be compromised, which may lead to regulatory non-compliance, reputational damage, and operational disruptions. Given the medium CVSS score and the requirement for user interaction, the threat is moderate but should not be underestimated, especially for sectors with high reliance on web applications such as finance, e-commerce, and public services. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation. Organizations failing to update may face increased risk if attackers develop exploit code leveraging this vulnerability.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Immediately identify all applications and services using Qwik framework versions prior to 1.19.0 through software inventory and dependency analysis. 2) Upgrade all affected Qwik instances to version 1.19.0 or later, which contains the patch addressing the header parsing and CSRF protection bypass. 3) Review and strengthen CSRF defenses by implementing additional server-side validation mechanisms, such as double-submit cookies or same-site cookies, to provide defense-in-depth. 4) Conduct security testing focusing on CSRF attack vectors, including attempts to exploit multi-valued or malformed Content-Type headers. 5) Educate developers and security teams about the nuances of HTTP header parsing and CSRF risks in modern JavaScript frameworks. 6) Monitor web application logs for unusual or suspicious requests involving multi-valued Content-Type headers or unexpected form submissions. 7) Implement Content Security Policy (CSP) headers to reduce the risk of malicious cross-origin requests. These targeted measures go beyond generic advice by addressing the specific nature of the vulnerability and its exploitation method.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-29T15:39:11.821Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698268e3f9fa50a62fe1ecc2
Added to database: 2/3/2026, 9:30:11 PM
Last enriched: 2/11/2026, 11:59:13 AM
Last updated: 3/21/2026, 3:11:54 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.