CVE-2025-10728: CWE-674 Uncontrolled Recursion in The Qt Company Qt
When the module renders a Svg file that contains a <pattern> element, it might end up rendering it recursively leading to stack overflow DoS
AI Analysis
Technical Summary
CVE-2025-10728 is a critical vulnerability identified in The Qt Company's Qt framework, specifically affecting versions 6.7.0 and 6.9.0. The vulnerability arises from uncontrolled recursion during the rendering of SVG files containing the <pattern> element. When such an SVG file is processed, the rendering engine may recursively invoke the pattern rendering without proper termination conditions, leading to a stack overflow. This stack overflow can cause a denial-of-service (DoS) condition by crashing the application or service using the vulnerable Qt versions. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursion depth is not properly controlled or limited. The CVSS 4.0 score of 9.4 (critical) reflects the high impact and ease of exploitation, with the attack vector being local (AV:L), requiring no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The vulnerability impacts confidentiality, integrity, and availability with high severity, as the stack overflow can disrupt service availability and potentially be leveraged in complex attack chains. No known exploits are currently in the wild, but the critical severity and the widespread use of Qt in desktop applications, embedded systems, and cross-platform software make this a significant threat. The absence of patch links suggests that remediation may not yet be available, emphasizing the need for immediate risk mitigation and monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-10728 can be substantial, especially for those relying on Qt-based applications in critical infrastructure, industrial control systems, telecommunications, automotive software, and embedded devices. A successful exploitation can lead to application crashes, service interruptions, and potential cascading failures in systems dependent on Qt for rendering SVG content. This can disrupt business operations, cause downtime, and potentially lead to data loss or corruption if the affected applications handle sensitive data. Given the vulnerability does not require user interaction or elevated privileges, attackers with local access or the ability to supply malicious SVG files can trigger the DoS condition. This is particularly concerning for sectors such as finance, healthcare, manufacturing, and government services in Europe, where availability and reliability are paramount. Additionally, the vulnerability could be exploited in supply chain attacks if malicious SVG content is embedded in documents or software updates. The high severity and critical CVSS score indicate that organizations should prioritize addressing this vulnerability to avoid operational disruptions and reputational damage.
Mitigation Recommendations
1. Immediate mitigation involves restricting or sanitizing SVG files containing <pattern> elements before rendering, especially from untrusted sources. 2. Implement input validation and content filtering to detect and block SVG files with potentially recursive patterns. 3. Where possible, disable SVG rendering or the specific pattern rendering feature in Qt if not required by the application. 4. Monitor application logs and system behavior for signs of crashes or stack overflow errors related to SVG rendering. 5. Employ application whitelisting and sandboxing to limit the impact of potential DoS attacks. 6. Engage with The Qt Company and monitor official channels for patches or updates addressing this vulnerability, and plan for rapid deployment once available. 7. Conduct thorough testing of Qt-based applications with SVG content to identify and mitigate any recursive rendering issues proactively. 8. Educate developers and system administrators about the risks of processing untrusted SVG content and enforce secure coding practices to handle such inputs safely.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Finland
CVE-2025-10728: CWE-674 Uncontrolled Recursion in The Qt Company Qt
Description
When the module renders a Svg file that contains a <pattern> element, it might end up rendering it recursively leading to stack overflow DoS
AI-Powered Analysis
Technical Analysis
CVE-2025-10728 is a critical vulnerability identified in The Qt Company's Qt framework, specifically affecting versions 6.7.0 and 6.9.0. The vulnerability arises from uncontrolled recursion during the rendering of SVG files containing the <pattern> element. When such an SVG file is processed, the rendering engine may recursively invoke the pattern rendering without proper termination conditions, leading to a stack overflow. This stack overflow can cause a denial-of-service (DoS) condition by crashing the application or service using the vulnerable Qt versions. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursion depth is not properly controlled or limited. The CVSS 4.0 score of 9.4 (critical) reflects the high impact and ease of exploitation, with the attack vector being local (AV:L), requiring no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The vulnerability impacts confidentiality, integrity, and availability with high severity, as the stack overflow can disrupt service availability and potentially be leveraged in complex attack chains. No known exploits are currently in the wild, but the critical severity and the widespread use of Qt in desktop applications, embedded systems, and cross-platform software make this a significant threat. The absence of patch links suggests that remediation may not yet be available, emphasizing the need for immediate risk mitigation and monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-10728 can be substantial, especially for those relying on Qt-based applications in critical infrastructure, industrial control systems, telecommunications, automotive software, and embedded devices. A successful exploitation can lead to application crashes, service interruptions, and potential cascading failures in systems dependent on Qt for rendering SVG content. This can disrupt business operations, cause downtime, and potentially lead to data loss or corruption if the affected applications handle sensitive data. Given the vulnerability does not require user interaction or elevated privileges, attackers with local access or the ability to supply malicious SVG files can trigger the DoS condition. This is particularly concerning for sectors such as finance, healthcare, manufacturing, and government services in Europe, where availability and reliability are paramount. Additionally, the vulnerability could be exploited in supply chain attacks if malicious SVG content is embedded in documents or software updates. The high severity and critical CVSS score indicate that organizations should prioritize addressing this vulnerability to avoid operational disruptions and reputational damage.
Mitigation Recommendations
1. Immediate mitigation involves restricting or sanitizing SVG files containing <pattern> elements before rendering, especially from untrusted sources. 2. Implement input validation and content filtering to detect and block SVG files with potentially recursive patterns. 3. Where possible, disable SVG rendering or the specific pattern rendering feature in Qt if not required by the application. 4. Monitor application logs and system behavior for signs of crashes or stack overflow errors related to SVG rendering. 5. Employ application whitelisting and sandboxing to limit the impact of potential DoS attacks. 6. Engage with The Qt Company and monitor official channels for patches or updates addressing this vulnerability, and plan for rapid deployment once available. 7. Conduct thorough testing of Qt-based applications with SVG content to identify and mitigate any recursive rendering issues proactively. 8. Educate developers and system administrators about the risks of processing untrusted SVG content and enforce secure coding practices to handle such inputs safely.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TQtC
- Date Reserved
- 2025-09-19T14:01:04.716Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68dfe0218ea44fea9ba2abad
Added to database: 10/3/2025, 2:39:29 PM
Last enriched: 10/3/2025, 2:39:45 PM
Last updated: 10/4/2025, 10:58:32 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Join the discussion: create a free account to comment and vote.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-24910: CWE-732:IncorrectPermissionAssignmentforCriticalResource in checkpoint ZoneAlarmExtremeSecurityNextGen,IdentityAgentforWindows,IdentityAgentforWindowsTerminalServer
HighCVE-2023-47488: n/a
MediumCVE-2023-48029: n/a
UnknownCVE-2023-47489: n/a
UnknownCVE-2023-48028: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.