CVE-2026-27971
CRITICALCVSS v3
9.8
CRITICAL
EPSS Score
24.4%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 3/3/2026
- Last Modified
- 3/5/2026
Frequently Asked Questions
What is CVE-2026-27971?
Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.
Is CVE-2026-27971 actively exploited?
Active exploitation of CVE-2026-27971 has not been confirmed. The EPSS score is 24.4%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2026-27971?
CVE-2026-27971 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.
Is CVE-2026-27971 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.