CVE-2026-27971

CRITICAL

CVSS v3

9.8

CRITICAL

EPSS Score

24.4%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.

Technical Details

CVSS v3 Vector
3.1
Published
3/3/2026
Last Modified
3/5/2026

Frequently Asked Questions

What is CVE-2026-27971?

Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.

Is CVE-2026-27971 actively exploited?

Active exploitation of CVE-2026-27971 has not been confirmed. The EPSS score is 24.4%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2026-27971?

CVE-2026-27971 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.

Is CVE-2026-27971 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.