CVE-2025-53620
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-07-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| builder.io | qwik-city | 1.13.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-248 | An exception is thrown from a function, but it is not caught. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
@builder.io/qwik-city is a meta-framework for Qwik. The vulnerability occurs when a Qwik Server Action QRL is executed and an invalid qfunc is sent. The server does not handle the resulting error properly, causing Node.js to exit unexpectedly. This can lead to a denial of service. The issue is fixed in version 1.13.0.
How can this vulnerability impact me? :
This vulnerability can cause the Node.js server running @builder.io/qwik-city to crash when an invalid qfunc is sent, resulting in a denial of service. This can disrupt availability of applications using this framework until the server is restarted or patched.
What immediate steps should I take to mitigate this vulnerability?
Update @builder.io/qwik-city to version 1.13.0 or later, as this version contains the fix for the vulnerability that causes Node.js to exit when an invalid qfunc is sent.