Moderate severityOSV Advisory· Published Feb 3, 2026· Updated Feb 4, 2026
[qwik-city] CSRF protection middleware does not work properly for content type header with parameters (eg. multipart/form-data)
CVE-2026-25155
Description
Qwik is a performance focused javascript framework. Prior to version 1.12.0, a typo in the regular expression within isContentType causes incorrect parsing of certain Content-Type headers. This issue has been patched in version 1.12.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@builder.io/qwik-citynpm | < 1.12.0 | 1.12.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-vm6g-8r4h-22x8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25155ghsaADVISORY
- github.com/QwikDev/qwik/commit/d70d7099b90b998f1aac7cedc21c67d87bac4c75ghsax_refsource_MISCWEB
- github.com/QwikDev/qwik/security/advisories/GHSA-vm6g-8r4h-22x8ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.