Low severityOSV Advisory· Published Feb 3, 2026· Updated Feb 4, 2026
Qwik City Open Redirect via fixTrailingSlash
CVE-2026-25149
Description
Qwik is a performance focused javascript framework. Prior to version 1.19.0, an Open Redirect vulnerability in Qwik City's default request handler middleware allows a remote attacker to redirect users to arbitrary protocol-relative URLs. Successful exploitation permits attackers to craft convincing phishing links that appear to originate from the trusted domain but redirect the victim to an attacker-controlled site. This issue has been patched in version 1.19.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@builder.io/qwik-citynpm | < 1.19.0 | 1.19.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-92j7-wgmg-f32mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25149ghsaADVISORY
- github.com/QwikDev/qwik/commit/9959eab30a3ad9cc03689eaa080fcfbc33df71edghsax_refsource_MISCWEB
- github.com/QwikDev/qwik/security/advisories/GHSA-92j7-wgmg-f32mghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.