CVE-2026-27971

Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qwik:qwik:*:*:*:*:*:node.js:*:*

History

05 Mar 2026, 17:57

Type Values Removed Values Added
CPE cpe:2.3:a:qwik:qwik:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/QwikDev/qwik/security/advisories/GHSA-p9x5-jp3h-96mm - () https://github.com/QwikDev/qwik/security/advisories/GHSA-p9x5-jp3h-96mm - Vendor Advisory
First Time Qwik qwik
Qwik

03 Mar 2026, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-03 23:15

Updated : 2026-03-05 17:57


NVD link : CVE-2026-27971

Mitre link : CVE-2026-27971

CVE.ORG link : CVE-2026-27971


JSON object : View

Products Affected

qwik

  • qwik
CWE
CWE-502

Deserialization of Untrusted Data