CVE-2026-25155: CWE-352: Cross-Site Request Forgery (CSRF) in QwikDev qwik
CVE-2026-25155 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability in the QwikDev qwik JavaScript framework versions prior to 1. 12. 0. The issue stems from a typo in a regular expression used in the isContentType function, causing incorrect parsing of certain Content-Type headers. This flaw can be exploited remotely without authentication but requires user interaction, potentially allowing attackers to perform unauthorized actions with high integrity impact but limited confidentiality and no availability impact. The vulnerability has been patched in version 1. 12. 0. European organizations using affected versions of qwik in their web applications may face risks of unauthorized state-changing requests. Mitigation involves upgrading to qwik 1.
AI Analysis
Technical Summary
CVE-2026-25155 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the QwikDev qwik JavaScript framework, specifically in versions prior to 1.12.0. The root cause is a typographical error in the regular expression within the isContentType function, which leads to incorrect parsing of certain Content-Type HTTP headers. This parsing flaw can be leveraged by attackers to bypass or weaken CSRF protections, enabling them to craft malicious requests that appear legitimate to the server. Since CSRF attacks rely on tricking authenticated users into submitting unwanted requests, the vulnerability requires user interaction but no prior authentication. The CVSS 3.1 score of 5.9 reflects a medium severity, with network attack vector, high attack complexity, no privileges required, and user interaction needed. The impact primarily affects the integrity of the application by allowing unauthorized state changes, while confidentiality and availability impacts are minimal or none. The vulnerability was publicly disclosed and patched in version 1.12.0 of qwik, emphasizing the importance of upgrading. No known exploits are currently reported in the wild, but the flaw's nature suggests potential for exploitation in web applications relying on vulnerable versions of qwik. The vulnerability highlights the criticality of precise input parsing in security-sensitive functions and the risks posed by subtle coding errors in widely used frameworks.
Potential Impact
For European organizations, the vulnerability poses a risk of unauthorized actions being performed on web applications that utilize vulnerable versions of the qwik framework. This can lead to data integrity issues such as unauthorized changes to user data, settings, or transactions. Although confidentiality and availability impacts are low, the integrity compromise can undermine trust in affected applications and potentially lead to financial or reputational damage. Organizations in sectors with high web application usage—such as finance, e-commerce, government, and technology—may face increased risk. The requirement for user interaction means phishing or social engineering could be used to trigger attacks. Given qwik’s focus on performance and modern web development, organizations adopting this framework for frontend development are particularly at risk if they have not updated to version 1.12.0 or later. Failure to patch may also expose organizations to compliance risks under European data protection regulations if unauthorized data manipulation occurs.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of the qwik framework to version 1.12.0 or later, where the parsing bug in isContentType has been corrected. Beyond patching, organizations should implement robust CSRF protections such as synchronizer tokens or double-submit cookies, ensuring these mechanisms are compatible with the framework’s content-type handling. Review and harden Content-Type header validation in web applications to prevent malformed or unexpected headers from bypassing security controls. Conduct thorough security testing, including CSRF attack simulations, on applications using qwik to identify residual weaknesses. Educate developers on secure coding practices related to input parsing and header validation. Monitor for suspicious user activity that may indicate attempted CSRF exploitation. Finally, maintain an inventory of applications using qwik to ensure timely updates and vulnerability management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2026-25155: CWE-352: Cross-Site Request Forgery (CSRF) in QwikDev qwik
Description
CVE-2026-25155 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability in the QwikDev qwik JavaScript framework versions prior to 1. 12. 0. The issue stems from a typo in a regular expression used in the isContentType function, causing incorrect parsing of certain Content-Type headers. This flaw can be exploited remotely without authentication but requires user interaction, potentially allowing attackers to perform unauthorized actions with high integrity impact but limited confidentiality and no availability impact. The vulnerability has been patched in version 1. 12. 0. European organizations using affected versions of qwik in their web applications may face risks of unauthorized state-changing requests. Mitigation involves upgrading to qwik 1.
AI-Powered Analysis
Technical Analysis
CVE-2026-25155 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the QwikDev qwik JavaScript framework, specifically in versions prior to 1.12.0. The root cause is a typographical error in the regular expression within the isContentType function, which leads to incorrect parsing of certain Content-Type HTTP headers. This parsing flaw can be leveraged by attackers to bypass or weaken CSRF protections, enabling them to craft malicious requests that appear legitimate to the server. Since CSRF attacks rely on tricking authenticated users into submitting unwanted requests, the vulnerability requires user interaction but no prior authentication. The CVSS 3.1 score of 5.9 reflects a medium severity, with network attack vector, high attack complexity, no privileges required, and user interaction needed. The impact primarily affects the integrity of the application by allowing unauthorized state changes, while confidentiality and availability impacts are minimal or none. The vulnerability was publicly disclosed and patched in version 1.12.0 of qwik, emphasizing the importance of upgrading. No known exploits are currently reported in the wild, but the flaw's nature suggests potential for exploitation in web applications relying on vulnerable versions of qwik. The vulnerability highlights the criticality of precise input parsing in security-sensitive functions and the risks posed by subtle coding errors in widely used frameworks.
Potential Impact
For European organizations, the vulnerability poses a risk of unauthorized actions being performed on web applications that utilize vulnerable versions of the qwik framework. This can lead to data integrity issues such as unauthorized changes to user data, settings, or transactions. Although confidentiality and availability impacts are low, the integrity compromise can undermine trust in affected applications and potentially lead to financial or reputational damage. Organizations in sectors with high web application usage—such as finance, e-commerce, government, and technology—may face increased risk. The requirement for user interaction means phishing or social engineering could be used to trigger attacks. Given qwik’s focus on performance and modern web development, organizations adopting this framework for frontend development are particularly at risk if they have not updated to version 1.12.0 or later. Failure to patch may also expose organizations to compliance risks under European data protection regulations if unauthorized data manipulation occurs.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of the qwik framework to version 1.12.0 or later, where the parsing bug in isContentType has been corrected. Beyond patching, organizations should implement robust CSRF protections such as synchronizer tokens or double-submit cookies, ensuring these mechanisms are compatible with the framework’s content-type handling. Review and harden Content-Type header validation in web applications to prevent malformed or unexpected headers from bypassing security controls. Conduct thorough security testing, including CSRF attack simulations, on applications using qwik to identify residual weaknesses. Educate developers on secure coding practices related to input parsing and header validation. Monitor for suspicious user activity that may indicate attempted CSRF exploitation. Finally, maintain an inventory of applications using qwik to ensure timely updates and vulnerability management.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-29T15:39:11.822Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698268e3f9fa50a62fe1ecc6
Added to database: 2/3/2026, 9:30:11 PM
Last enriched: 2/3/2026, 9:45:06 PM
Last updated: 2/4/2026, 12:02:17 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumCVE-2026-24513: CWE-754 Improper Check for Unusual or Exceptional Conditions in Kubernetes ingress-nginx
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.