Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p9x5-jp3h-96mm | Qwik vulnerable to Unauthenticated RCE via server$ Deserialization |
Thu, 05 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qwik
Qwik qwik |
|
| CPEs | cpe:2.3:a:qwik:qwik:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Qwik
Qwik qwik |
|
| Metrics |
cvssV3_1
|
Wed, 04 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qwikdev
Qwikdev qwik |
|
| Vendors & Products |
Qwikdev
Qwikdev qwik |
Tue, 03 Mar 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1. | |
| Title | Qwik affected by unauthenticated RCE via server$ Deserialization | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-04T16:05:45.401Z
Reserved: 2026-02-25T03:24:57.793Z
Link: CVE-2026-27971
Updated: 2026-03-04T16:05:39.747Z
Status : Analyzed
Published: 2026-03-03T23:15:56.227
Modified: 2026-03-05T17:57:37.233
Link: CVE-2026-27971
No data.
OpenCVE Enrichment
Updated: 2026-05-10T14:45:14Z
Github GHSA