Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25155: CWE-352: Cross-Site Request Forgery (CSRF) in QwikDev qwik

0
Medium
VulnerabilityCVE-2026-25155cvecve-2026-25155cwe-352
Published: Tue Feb 03 2026 (02/03/2026, 21:12:13 UTC)
Source: CVE Database V5
Vendor/Project: QwikDev
Product: qwik

Description

CVE-2026-25155 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability in the Qwik JavaScript framework versions prior to 1. 12. 0. The flaw stems from a typo in the regular expression used by the isContentType function, causing improper parsing of certain Content-Type headers. This parsing error can be exploited by attackers to craft malicious requests that bypass normal CSRF protections, potentially leading to unauthorized actions with high integrity impact but low confidentiality and no availability impact. The vulnerability requires user interaction and remote network access but no authentication. Although no known exploits are reported in the wild, organizations using vulnerable Qwik versions should upgrade to 1. 12. 0 or later. European organizations that heavily rely on Qwik for web applications, especially in countries with significant software development ecosystems, are at risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:59:38 UTC

Technical Analysis

CVE-2026-25155 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Qwik JavaScript framework, a performance-oriented framework used for building web applications. The root cause is a typo in the regular expression within the isContentType function prior to version 1.12.0, which leads to incorrect parsing of certain Content-Type headers. This parsing flaw can be exploited by attackers to bypass CSRF protections by crafting malicious HTTP requests that appear legitimate to the server. The vulnerability does not require authentication but does require user interaction, such as tricking a user into visiting a malicious website. The CVSS 3.1 base score is 5.9, reflecting a medium severity with network attack vector, high attack complexity, no privileges required, and user interaction needed. The impact primarily affects the integrity of the application, allowing unauthorized state-changing actions, while confidentiality and availability impacts are low or none. No known exploits have been reported in the wild yet, but the vulnerability has been patched in Qwik version 1.12.0. Organizations using earlier versions should prioritize upgrading. The vulnerability highlights the importance of correct Content-Type header parsing and robust CSRF defenses in modern JavaScript frameworks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant in environments where Qwik is used to build interactive web applications that handle sensitive user actions or data. Successful exploitation could allow attackers to perform unauthorized state-changing operations on behalf of authenticated users, potentially leading to data corruption, unauthorized transactions, or configuration changes. While confidentiality impact is low, the integrity compromise can disrupt business processes or damage trust in web services. The lack of availability impact means services remain operational but potentially manipulated. Given the medium severity and the requirement for user interaction, the threat is more relevant in scenarios with high user engagement and where social engineering can be effective. Organizations in sectors such as finance, e-commerce, and public services that rely on Qwik-based applications should be particularly vigilant. Failure to patch could expose these organizations to targeted attacks, especially in the context of increasing web application threats in Europe.

Mitigation Recommendations

1. Upgrade all Qwik framework instances to version 1.12.0 or later immediately to apply the official patch fixing the isContentType parsing issue. 2. Implement strict CSRF protection mechanisms beyond relying solely on Content-Type header parsing, including the use of anti-CSRF tokens (e.g., synchronizer tokens or double-submit cookies) in all state-changing requests. 3. Validate and sanitize Content-Type headers rigorously on the server side to prevent malformed or malicious headers from bypassing security controls. 4. Educate developers on secure coding practices related to HTTP header parsing and CSRF defenses within JavaScript frameworks. 5. Conduct security testing and code reviews focusing on request validation and CSRF protections in applications using Qwik. 6. Monitor web application logs for unusual or suspicious request patterns that may indicate attempted CSRF exploitation. 7. Employ Content Security Policy (CSP) headers to reduce the risk of malicious script execution that could facilitate CSRF attacks. 8. Encourage user awareness campaigns to reduce the risk of social engineering that leads to user interaction with malicious sites.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698268e3f9fa50a62fe1ecc6

Added to database: 2/3/2026, 9:30:11 PM

Last enriched: 2/11/2026, 11:59:38 AM

Last updated: 3/21/2026, 3:18:00 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses