Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-92j7-wgmg-f32m | Qwik City Open Redirect via fixTrailingSlash |
Tue, 10 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qwik
Qwik qwik |
|
| CPEs | cpe:2.3:a:qwik:qwik:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Qwik
Qwik qwik |
|
| Metrics |
cvssV3_1
|
Wed, 04 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qwikdev
Qwikdev qwik |
|
| Vendors & Products |
Qwikdev
Qwikdev qwik |
Tue, 03 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Qwik is a performance focused javascript framework. Prior to version 1.19.0, an Open Redirect vulnerability in Qwik City's default request handler middleware allows a remote attacker to redirect users to arbitrary protocol-relative URLs. Successful exploitation permits attackers to craft convincing phishing links that appear to originate from the trusted domain but redirect the victim to an attacker-controlled site. This issue has been patched in version 1.19.0. | |
| Title | Qwik City Open Redirect via fixTrailingSlash | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-04T19:59:30.294Z
Reserved: 2026-01-29T15:39:11.821Z
Link: CVE-2026-25149
Updated: 2026-02-04T19:59:26.654Z
Status : Analyzed
Published: 2026-02-03T22:16:30.523
Modified: 2026-02-10T20:11:36.010
Link: CVE-2026-25149
No data.
OpenCVE Enrichment
Updated: 2026-04-18T18:45:05Z
Github GHSA