Moderate severityOSV Advisory· Published Feb 3, 2026· Updated Feb 4, 2026
Qwik City has a CSRF Protection Bypass via Content-Type Header Validation
CVE-2026-25151
Description
Qwik is a performance focused javascript framework. Prior to version 1.19.0, Qwik City’s server-side request handler inconsistently interprets HTTP request headers, which can be abused by a remote attacker to circumvent form submission CSRF protections using specially crafted or multi-valued Content-Type headers. This issue has been patched in version 1.19.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@builder.io/qwik-citynpm | < 1.19.0 | 1.19.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-r666-8gjf-4v5fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25151ghsaADVISORY
- github.com/QwikDev/qwik/commit/eebf610e04cc3a690f11e10191d09ff0fca1c7edghsax_refsource_MISCWEB
- github.com/QwikDev/qwik/security/advisories/GHSA-r666-8gjf-4v5fghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.