Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32701: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in QwikDev qwik

0
High
VulnerabilityCVE-2026-32701cvecve-2026-32701cwe-843cwe-1321
Published: Fri Mar 20 2026 (03/20/2026, 08:52:41 UTC)
Source: CVE Database V5
Vendor/Project: QwikDev
Product: qwik

Description

CVE-2026-32701 is a high-severity vulnerability in Qwik, a JavaScript framework, affecting versions prior to 1. 19. 2. The flaw arises from improper parsing of FormData with dotted field names, leading to type confusion when arrays are inferred incorrectly. Attackers can submit mixed array-index and object-property keys for the same path, causing user-controlled properties to overwrite expected array values. This can result in request handling failures, denial of service via malformed array states or oversized lengths, and unpredictable behavior in downstream code. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The vulnerability was fixed in version 1. 19. 2.

AI-Powered Analysis

AILast updated: 03/20/2026, 09:23:52 UTC

Technical Analysis

CVE-2026-32701 is a type confusion vulnerability in the Qwik JavaScript framework (versions prior to 1.19.2) related to how FormData is parsed when handling application/x-www-form-urlencoded or multipart/form-data requests. Qwik City converts dotted field names (e.g., items.0, items.1) into nested data structures, inferring arrays from these dotted keys. However, if an attacker submits a mixture of array-index keys and object-property keys for the same path—such as items.toString, items.push, items.valueOf, or items.length—this can cause user-controlled properties to be written onto values that the application expects to be arrays. This leads to type confusion, where the data type of a variable is not what the application logic expects. The consequences include malformed array states, oversized array lengths, and potential denial of service due to request handling failures or crashes in downstream code that relies on the array structure. The vulnerability does not impact confidentiality or integrity directly but severely impacts availability by causing application failures. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The issue was addressed and fixed in Qwik version 1.19.2 by correcting the parsing logic to prevent incompatible type assignments during FormData processing.

Potential Impact

This vulnerability can cause denial of service conditions in web applications using vulnerable Qwik versions by corrupting internal data structures during request parsing. Applications may crash or behave unpredictably when processing specially crafted form submissions, leading to downtime and degraded user experience. Since exploitation requires no authentication and can be performed remotely, attackers can disrupt services at scale. Although it does not directly expose sensitive data or allow code execution, the resulting instability can be leveraged as part of larger attack campaigns to degrade service availability or bypass certain logic checks relying on array structures. Organizations relying on Qwik for performance-focused web applications risk significant operational impact, especially those with high traffic or critical uptime requirements. The vulnerability also increases the attack surface for chained exploits that may leverage denial of service conditions to facilitate further compromise.

Mitigation Recommendations

The primary mitigation is to upgrade all Qwik framework instances to version 1.19.2 or later, where the parsing logic flaw has been corrected. Additionally, developers should implement strict input validation and sanitization on form data, especially for dotted field names and array-like structures, to prevent injection of unexpected keys. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious form submissions containing mixed array-index and object-property keys can provide a temporary protective layer. Monitoring application logs for anomalies in form data processing and unusual request patterns can help detect exploitation attempts. Developers should also review downstream code that processes parsed form data to ensure robust type checking and error handling to mitigate the impact of malformed inputs. Finally, adopting a defense-in-depth approach by isolating critical components and limiting the impact of denial of service conditions is recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T14:33:42.823Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd0ec2e32a4fbe5f4a70d5

Added to database: 3/20/2026, 9:09:22 AM

Last enriched: 3/20/2026, 9:23:52 AM

Last updated: 3/20/2026, 10:32:55 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses