CVE-2026-25151 PUBLISHED

Qwik City has a CSRF Protection Bypass via Content-Type Header Validation

Assigner: GitHub_M
Reserved: 29.01.2026 Published: 03.02.2026 Updated: 04.02.2026

Qwik is a performance focused javascript framework. Prior to version 1.19.0, Qwik City’s server-side request handler inconsistently interprets HTTP request headers, which can be abused by a remote attacker to circumvent form submission CSRF protections using specially crafted or multi-valued Content-Type headers. This issue has been patched in version 1.19.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
CVSS Score: 5.9

Product Status

Vendor QwikDev
Product qwik
Versions
  • Version < 1.19.0 is affected

References

Problem Types

  • CWE-352: Cross-Site Request Forgery (CSRF) CWE