Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.
References
| Link | Resource |
|---|---|
| https://github.com/QwikDev/qwik/security/advisories/GHSA-p9x5-jp3h-96mm | Vendor Advisory |
Configurations
History
05 Mar 2026, 17:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:qwik:qwik:*:*:*:*:*:node.js:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/QwikDev/qwik/security/advisories/GHSA-p9x5-jp3h-96mm - Vendor Advisory | |
| First Time |
Qwik qwik
Qwik |
03 Mar 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-03 23:15
Updated : 2026-03-05 17:57
NVD link : CVE-2026-27971
Mitre link : CVE-2026-27971
CVE.ORG link : CVE-2026-27971
JSON object : View
Products Affected
qwik
- qwik
CWE
CWE-502
Deserialization of Untrusted Data
