Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25151: CWE-352: Cross-Site Request Forgery (CSRF) in QwikDev qwik

0
Medium
VulnerabilityCVE-2026-25151cvecve-2026-25151cwe-352
Published: Tue Feb 03 2026 (02/03/2026, 21:12:25 UTC)
Source: CVE Database V5
Vendor/Project: QwikDev
Product: qwik

Description

CVE-2026-25151 is a Cross-Site Request Forgery (CSRF) vulnerability in QwikDev's Qwik JavaScript framework versions prior to 1. 19. 0. The issue arises from inconsistent interpretation of HTTP request headers, specifically Content-Type headers, by Qwik City's server-side request handler. This flaw allows remote attackers to bypass CSRF protections by crafting or using multi-valued Content-Type headers, potentially leading to unauthorized actions with elevated integrity impact. The vulnerability has a CVSS score of 5. 9 (medium severity) and requires user interaction but no authentication. It affects web applications built on vulnerable Qwik versions and has no known exploits in the wild yet. The issue was patched in version 1. 19.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:59:13 UTC

Technical Analysis

CVE-2026-25151 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting QwikDev's Qwik JavaScript framework, specifically versions prior to 1.19.0. Qwik is designed for high-performance web applications, and Qwik City is its server-side request handler component. The vulnerability stems from inconsistent parsing of HTTP request headers, particularly the Content-Type header, by the server-side handler. Attackers can exploit this by sending specially crafted or multi-valued Content-Type headers that circumvent the framework's CSRF protections, which normally prevent unauthorized form submissions from malicious sites. This bypass allows attackers to perform unauthorized state-changing operations on behalf of authenticated users, impacting the integrity of affected applications. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N) indicates that the attack is network-based, requires high attack complexity, no privileges, and user interaction, with low confidentiality impact but high integrity impact and no availability impact. No known exploits have been reported in the wild, but the vulnerability is significant for applications relying on Qwik versions before 1.19.0. The issue was addressed in Qwik version 1.19.0 by correcting the header parsing logic to enforce consistent CSRF protections. Organizations using Qwik should verify their versions and apply the patch to prevent potential exploitation.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to web applications built using vulnerable versions of the Qwik framework. Successful exploitation can lead to unauthorized actions performed with the privileges of authenticated users, potentially resulting in data manipulation, unauthorized transactions, or configuration changes. While confidentiality impact is low, the integrity of critical business processes and data can be compromised, which may lead to regulatory non-compliance, reputational damage, and operational disruptions. Given the medium CVSS score and the requirement for user interaction, the threat is moderate but should not be underestimated, especially for sectors with high reliance on web applications such as finance, e-commerce, and public services. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation. Organizations failing to update may face increased risk if attackers develop exploit code leveraging this vulnerability.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Immediately identify all applications and services using Qwik framework versions prior to 1.19.0 through software inventory and dependency analysis. 2) Upgrade all affected Qwik instances to version 1.19.0 or later, which contains the patch addressing the header parsing and CSRF protection bypass. 3) Review and strengthen CSRF defenses by implementing additional server-side validation mechanisms, such as double-submit cookies or same-site cookies, to provide defense-in-depth. 4) Conduct security testing focusing on CSRF attack vectors, including attempts to exploit multi-valued or malformed Content-Type headers. 5) Educate developers and security teams about the nuances of HTTP header parsing and CSRF risks in modern JavaScript frameworks. 6) Monitor web application logs for unusual or suspicious requests involving multi-valued Content-Type headers or unexpected form submissions. 7) Implement Content Security Policy (CSP) headers to reduce the risk of malicious cross-origin requests. These targeted measures go beyond generic advice by addressing the specific nature of the vulnerability and its exploitation method.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.821Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698268e3f9fa50a62fe1ecc2

Added to database: 2/3/2026, 9:30:11 PM

Last enriched: 2/11/2026, 11:59:13 AM

Last updated: 3/21/2026, 3:11:54 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses