CVE-2026-27971
CRITICAL EXPLOITED NUCLEIQwik <=1.19.0 - Deserialization RCE
Title source: llmDescription
Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.
Nuclei Templates (1)
Qwik - Unauthenticated RCE via server$ Deserialization
CRITICALVERIFIEDby omarkurt
Shodan:
http.html:"q:version"
FOFA:
body="q:version"
Scores
CVSS v3
9.8
EPSS
0.2998
EPSS Percentile
96.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2026-04-01
CWE
CWE-502
Status
published
Products (2)
builder.io/qwik
0 - 1.19.1npm
qwik/qwik
< 1.19.1
Published
Mar 03, 2026
Tracked Since
Mar 04, 2026