VYPR
Moderate severityOSV Advisory· Published Feb 3, 2026· Updated Feb 4, 2026

Qwik City has a CSRF Protection Bypass via Content-Type Header Validation

CVE-2026-25151

Description

Qwik is a performance focused javascript framework. Prior to version 1.19.0, Qwik City’s server-side request handler inconsistently interprets HTTP request headers, which can be abused by a remote attacker to circumvent form submission CSRF protections using specially crafted or multi-valued Content-Type headers. This issue has been patched in version 1.19.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
@builder.io/qwik-citynpm
< 1.19.01.19.0

Affected products

1
  • Range: @builder.io/qwik-city@1.10.0, @builder.io/qwik-city@1.14.0, @builder.io/qwik-city@1.14.1, …

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.