Description
Qwik is a performance focused javascript framework. Prior to version 1.19.0, a Cross-Site Scripting vulnerability in Qwik.js' server-side rendering virtual attribute serialization allows a remote attacker to inject arbitrary web scripts into server-rendered pages via virtual attributes. Successful exploitation permits script execution in a victim's browser in the context of the affected origin. This issue has been patched in version 1.19.0.
Published: 2026-02-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

A flaw in the serialization of virtual attributes during Qwik’s server‑side rendering allows a remote attacker to inject arbitrary script code into pages that are rendered on the server. The vulnerability is a classic example of a reflected cross‑site scripting flaw (CWE‑79) that can lead to the execution of malicious scripts in a victim’s browser while retaining the privileges of the affected origin. The official CVSS score of 5.3 reflects the moderate severity of the impact, which is limited to the client side and does not grant direct server‑side code execution.

Affected Systems

The issue affects the Qwik framework distributed by QwikDev, specifically all versions released before 1.19.0. Applications that render pages on the server using Qwik’s virtual node mechanism are susceptible. The vulnerability is not tied to a specific deployment environment beyond those that enable Qwik’s server‑side rendering capability.

Risk and Exploitability

The low EPSS score of less than 1 percent indicates that the likelihood of widespread exploitation is currently small, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, any publicly accessible Qwik application that performs server‑side rendering and accepts user‑controlled values in virtual attributes is a potential target. Exploitation would typically involve supplying malicious content that is reflected during the rendering process and then serving the resulting page to a victim’s browser, where the injected script would execute in the context of the application’s origin.

Generated by OpenCVE AI on April 18, 2026 at 00:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Qwik to version 1.19.0 or later, which removes the unsafe serialization behavior.
  • If an immediate upgrade is not possible, disable server‑side rendering for pages that handle untrusted data or avoid using untrusted virtual attributes in SSR contexts.
  • Add a Content‑Security‑Policy header that restricts script sources, such as "script-src 'self';" to mitigate the impact of any remaining reflected scripts.

Generated by OpenCVE AI on April 18, 2026 at 00:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m6jq-g7gq-5w3c Qwik SSR XSS via Unsafe Virtual Node Serialization
History

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Qwik
Qwik qwik
CPEs cpe:2.3:a:qwik:qwik:*:*:*:*:*:node.js:*:*
Vendors & Products Qwik
Qwik qwik
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Qwikdev
Qwikdev qwik
Vendors & Products Qwikdev
Qwikdev qwik

Tue, 03 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description Qwik is a performance focused javascript framework. Prior to version 1.19.0, a Cross-Site Scripting vulnerability in Qwik.js' server-side rendering virtual attribute serialization allows a remote attacker to inject arbitrary web scripts into server-rendered pages via virtual attributes. Successful exploitation permits script execution in a victim's browser in the context of the affected origin. This issue has been patched in version 1.19.0.
Title Qwik SSR XSS via Unsafe Virtual Node Serialization
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T16:58:39.293Z

Reserved: 2026-01-29T15:39:11.821Z

Link: CVE-2026-25148

cve-icon Vulnrichment

Updated: 2026-02-04T16:58:34.702Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T22:16:30.370

Modified: 2026-02-10T20:12:16.070

Link: CVE-2026-25148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:15:31Z

Weaknesses