VYPR
Low severityOSV Advisory· Published Feb 3, 2026· Updated Feb 4, 2026

Qwik City Open Redirect via fixTrailingSlash

CVE-2026-25149

Description

Qwik is a performance focused javascript framework. Prior to version 1.19.0, an Open Redirect vulnerability in Qwik City's default request handler middleware allows a remote attacker to redirect users to arbitrary protocol-relative URLs. Successful exploitation permits attackers to craft convincing phishing links that appear to originate from the trusted domain but redirect the victim to an attacker-controlled site. This issue has been patched in version 1.19.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
@builder.io/qwik-citynpm
< 1.19.01.19.0

Affected products

1
  • Range: @builder.io/qwik-city@1.10.0, @builder.io/qwik-city@1.14.0, @builder.io/qwik-city@1.14.1, …

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.