Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25151: CWE-352: Cross-Site Request Forgery (CSRF) in QwikDev qwik

0
Medium
VulnerabilityCVE-2026-25151cvecve-2026-25151cwe-352
Published: Tue Feb 03 2026 (02/03/2026, 21:12:25 UTC)
Source: CVE Database V5
Vendor/Project: QwikDev
Product: qwik

Description

CVE-2026-25151 is a Cross-Site Request Forgery (CSRF) vulnerability in QwikDev's Qwik JavaScript framework versions prior to 1. 19. 0. The issue arises from inconsistent interpretation of HTTP request headers, specifically multi-valued or specially crafted Content-Type headers, by Qwik City's server-side request handler. This flaw allows remote attackers to bypass CSRF protections on form submissions, potentially leading to unauthorized actions performed on behalf of authenticated users. The vulnerability has a medium severity with a CVSS score of 5. 9 and requires user interaction but no authentication. It affects web applications using vulnerable Qwik versions and has not been observed exploited in the wild. The issue was patched in version 1. 19.

AI-Powered Analysis

AILast updated: 02/03/2026, 21:45:19 UTC

Technical Analysis

CVE-2026-25151 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting QwikDev's Qwik JavaScript framework, specifically versions prior to 1.19.0. Qwik is a performance-focused framework used to build modern web applications, and Qwik City is its server-side routing and request handling component. The vulnerability stems from Qwik City's inconsistent parsing of HTTP request headers, notably the Content-Type header when it is multi-valued or specially crafted. This inconsistency can be exploited by remote attackers to circumvent the framework's built-in CSRF protections on form submissions. Normally, CSRF protections rely on validating tokens or headers to ensure that form submissions originate from legitimate sources. However, due to the flawed header interpretation, attackers can craft requests that bypass these checks, causing the server to accept unauthorized requests as valid. The vulnerability requires user interaction (e.g., tricking a user into submitting a malicious form) but does not require the attacker to have prior authentication or elevated privileges. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N) indicates network attack vector, high attack complexity, no privileges required, user interaction needed, unchanged scope, low confidentiality impact, high integrity impact, and no availability impact. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to applications relying on vulnerable Qwik versions. The issue was addressed and patched in Qwik version 1.19.0, which corrects the header parsing logic to enforce consistent CSRF protections.

Potential Impact

For European organizations, the impact of CVE-2026-25151 can be significant, especially for those developing or deploying web applications using the Qwik framework prior to version 1.19.0. Successful exploitation allows attackers to perform unauthorized state-changing actions on behalf of authenticated users, potentially leading to data manipulation, unauthorized transactions, or privilege escalation within web applications. This can compromise data integrity and user trust, and may result in regulatory non-compliance under GDPR if personal data is affected. The medium severity rating reflects the need for user interaction and the high attack complexity, which somewhat limits widespread exploitation but does not eliminate risk. Organizations in sectors such as finance, healthcare, e-commerce, and government services are particularly vulnerable due to the sensitive nature of their web applications and the potential impact of unauthorized actions. Additionally, the vulnerability could be leveraged in targeted phishing campaigns to trick users into submitting malicious requests. Given the increasing adoption of modern JavaScript frameworks like Qwik in Europe, the threat surface is growing, necessitating prompt remediation to avoid reputational damage and financial losses.

Mitigation Recommendations

European organizations should immediately audit their web applications to identify any usage of Qwik framework versions prior to 1.19.0. The primary mitigation is to upgrade all affected Qwik instances to version 1.19.0 or later, where the vulnerability has been patched. In parallel, developers should review and strengthen CSRF protections by implementing strict validation of Content-Type headers and ensuring that multi-valued headers are properly handled. Employing additional CSRF defenses such as SameSite cookies, double-submit cookies, and origin header validation can provide layered protection. Security teams should also conduct penetration testing focused on CSRF attack vectors involving crafted headers to verify the effectiveness of mitigations. Monitoring web application logs for unusual or malformed Content-Type headers and suspicious form submissions can help detect attempted exploitation. User awareness training to recognize phishing attempts that might trigger CSRF attacks is recommended. Finally, integrating automated dependency management and vulnerability scanning tools into the development lifecycle will help prevent future use of vulnerable framework versions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.821Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698268e3f9fa50a62fe1ecc2

Added to database: 2/3/2026, 9:30:11 PM

Last enriched: 2/3/2026, 9:45:19 PM

Last updated: 2/3/2026, 11:58:05 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats