Description
Qwik is a performance focused javascript framework. Prior to version 1.19.0, a Cross-Site Scripting vulnerability in Qwik.js' server-side rendering virtual attribute serialization allows a remote attacker to inject arbitrary web scripts into server-rendered pages via virtual attributes. Successful exploitation permits script execution in a victim's browser in the context of the affected origin. This issue has been patched in version 1.19.0.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/QwikDev/qwik/security/advisories/GHSA-m6jq-g7gq-5w3c
Patch x_refsource_misc
https://github.com/QwikDev/qwik/commit/fe2d9232c0bcec99411d51a00dae29295871d094
Scores
CVSS v3
6.1
EPSS
0.0002
EPSS Percentile
6.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
builder.io/qwik-city
0 - 1.19.0npm
qwik/qwik
< 1.19.0
Published
Feb 03, 2026
Tracked Since
Feb 18, 2026