Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25155: CWE-352: Cross-Site Request Forgery (CSRF) in QwikDev qwik

0
Medium
VulnerabilityCVE-2026-25155cvecve-2026-25155cwe-352
Published: Tue Feb 03 2026 (02/03/2026, 21:12:13 UTC)
Source: CVE Database V5
Vendor/Project: QwikDev
Product: qwik

Description

CVE-2026-25155 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability in the QwikDev qwik JavaScript framework versions prior to 1. 12. 0. The issue stems from a typo in a regular expression used in the isContentType function, causing incorrect parsing of certain Content-Type headers. This flaw can be exploited remotely without authentication but requires user interaction, potentially allowing attackers to perform unauthorized actions with high integrity impact but limited confidentiality and no availability impact. The vulnerability has been patched in version 1. 12. 0. European organizations using affected versions of qwik in their web applications may face risks of unauthorized state-changing requests. Mitigation involves upgrading to qwik 1.

AI-Powered Analysis

AILast updated: 02/03/2026, 21:45:06 UTC

Technical Analysis

CVE-2026-25155 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the QwikDev qwik JavaScript framework, specifically in versions prior to 1.12.0. The root cause is a typographical error in the regular expression within the isContentType function, which leads to incorrect parsing of certain Content-Type HTTP headers. This parsing flaw can be leveraged by attackers to bypass or weaken CSRF protections, enabling them to craft malicious requests that appear legitimate to the server. Since CSRF attacks rely on tricking authenticated users into submitting unwanted requests, the vulnerability requires user interaction but no prior authentication. The CVSS 3.1 score of 5.9 reflects a medium severity, with network attack vector, high attack complexity, no privileges required, and user interaction needed. The impact primarily affects the integrity of the application by allowing unauthorized state changes, while confidentiality and availability impacts are minimal or none. The vulnerability was publicly disclosed and patched in version 1.12.0 of qwik, emphasizing the importance of upgrading. No known exploits are currently reported in the wild, but the flaw's nature suggests potential for exploitation in web applications relying on vulnerable versions of qwik. The vulnerability highlights the criticality of precise input parsing in security-sensitive functions and the risks posed by subtle coding errors in widely used frameworks.

Potential Impact

For European organizations, the vulnerability poses a risk of unauthorized actions being performed on web applications that utilize vulnerable versions of the qwik framework. This can lead to data integrity issues such as unauthorized changes to user data, settings, or transactions. Although confidentiality and availability impacts are low, the integrity compromise can undermine trust in affected applications and potentially lead to financial or reputational damage. Organizations in sectors with high web application usage—such as finance, e-commerce, government, and technology—may face increased risk. The requirement for user interaction means phishing or social engineering could be used to trigger attacks. Given qwik’s focus on performance and modern web development, organizations adopting this framework for frontend development are particularly at risk if they have not updated to version 1.12.0 or later. Failure to patch may also expose organizations to compliance risks under European data protection regulations if unauthorized data manipulation occurs.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of the qwik framework to version 1.12.0 or later, where the parsing bug in isContentType has been corrected. Beyond patching, organizations should implement robust CSRF protections such as synchronizer tokens or double-submit cookies, ensuring these mechanisms are compatible with the framework’s content-type handling. Review and harden Content-Type header validation in web applications to prevent malformed or unexpected headers from bypassing security controls. Conduct thorough security testing, including CSRF attack simulations, on applications using qwik to identify residual weaknesses. Educate developers on secure coding practices related to input parsing and header validation. Monitor for suspicious user activity that may indicate attempted CSRF exploitation. Finally, maintain an inventory of applications using qwik to ensure timely updates and vulnerability management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-29T15:39:11.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698268e3f9fa50a62fe1ecc6

Added to database: 2/3/2026, 9:30:11 PM

Last enriched: 2/3/2026, 9:45:06 PM

Last updated: 2/4/2026, 12:02:17 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats