Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r666-8gjf-4v5f

Опубликовано: 03 фев. 2026
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Qwik City has a CSRF Protection Bypass via Content-Type Header Validation

Summary

Qwik City’s server-side request handler inconsistently interprets HTTP request headers, which can be abused by a remote attacker to circumvent form submission CSRF protections using specially crafted or multi-valued Content-Type headers.

Impact

A vulnerability in checkCSRF lets an attacker bypass Origin-based CSRF checks by using malformed or multi-valued Content-Type headers. Exploitation requires the CORS preflight to succeed (so it’s blocked if preflight is denied) and is possible when the application accepts cross-origin requests or via non-browser clients. Impact varies with server CORS and cookie policies and may enable unauthorized state changes.

Пакеты

Наименование

@builder.io/qwik-city

npm
Затронутые версииВерсия исправления

< 1.19.0

1.19.0

EPSS

Процентиль: 0%
0.00006
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 5.9
nvd
3 дня назад

Qwik is a performance focused javascript framework. Prior to version 1.19.0, Qwik City’s server-side request handler inconsistently interprets HTTP request headers, which can be abused by a remote attacker to circumvent form submission CSRF protections using specially crafted or multi-valued Content-Type headers. This issue has been patched in version 1.19.0.

CVSS3: 5.9
debian
3 дня назад

Qwik is a performance focused javascript framework. Prior to version 1 ...

EPSS

Процентиль: 0%
0.00006
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-352