Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10728: CWE-674 Uncontrolled Recursion in The Qt Company Qt

0
Critical
VulnerabilityCVE-2025-10728cvecve-2025-10728cwe-674
Published: Fri Oct 03 2025 (10/03/2025, 14:35:02 UTC)
Source: CVE Database V5
Vendor/Project: The Qt Company
Product: Qt

Description

When the module renders a Svg file that contains a <pattern> element, it might end up rendering it recursively leading to stack overflow DoS

AI-Powered Analysis

AILast updated: 10/03/2025, 14:39:45 UTC

Technical Analysis

CVE-2025-10728 is a critical vulnerability identified in The Qt Company's Qt framework, specifically affecting versions 6.7.0 and 6.9.0. The vulnerability arises from uncontrolled recursion during the rendering of SVG files containing the <pattern> element. When such an SVG file is processed, the rendering engine may recursively invoke the pattern rendering without proper termination conditions, leading to a stack overflow. This stack overflow can cause a denial-of-service (DoS) condition by crashing the application or service using the vulnerable Qt versions. The vulnerability is classified under CWE-674 (Uncontrolled Recursion), indicating that the recursion depth is not properly controlled or limited. The CVSS 4.0 score of 9.4 (critical) reflects the high impact and ease of exploitation, with the attack vector being local (AV:L), requiring no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The vulnerability impacts confidentiality, integrity, and availability with high severity, as the stack overflow can disrupt service availability and potentially be leveraged in complex attack chains. No known exploits are currently in the wild, but the critical severity and the widespread use of Qt in desktop applications, embedded systems, and cross-platform software make this a significant threat. The absence of patch links suggests that remediation may not yet be available, emphasizing the need for immediate risk mitigation and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-10728 can be substantial, especially for those relying on Qt-based applications in critical infrastructure, industrial control systems, telecommunications, automotive software, and embedded devices. A successful exploitation can lead to application crashes, service interruptions, and potential cascading failures in systems dependent on Qt for rendering SVG content. This can disrupt business operations, cause downtime, and potentially lead to data loss or corruption if the affected applications handle sensitive data. Given the vulnerability does not require user interaction or elevated privileges, attackers with local access or the ability to supply malicious SVG files can trigger the DoS condition. This is particularly concerning for sectors such as finance, healthcare, manufacturing, and government services in Europe, where availability and reliability are paramount. Additionally, the vulnerability could be exploited in supply chain attacks if malicious SVG content is embedded in documents or software updates. The high severity and critical CVSS score indicate that organizations should prioritize addressing this vulnerability to avoid operational disruptions and reputational damage.

Mitigation Recommendations

1. Immediate mitigation involves restricting or sanitizing SVG files containing <pattern> elements before rendering, especially from untrusted sources. 2. Implement input validation and content filtering to detect and block SVG files with potentially recursive patterns. 3. Where possible, disable SVG rendering or the specific pattern rendering feature in Qt if not required by the application. 4. Monitor application logs and system behavior for signs of crashes or stack overflow errors related to SVG rendering. 5. Employ application whitelisting and sandboxing to limit the impact of potential DoS attacks. 6. Engage with The Qt Company and monitor official channels for patches or updates addressing this vulnerability, and plan for rapid deployment once available. 7. Conduct thorough testing of Qt-based applications with SVG content to identify and mitigate any recursive rendering issues proactively. 8. Educate developers and system administrators about the risks of processing untrusted SVG content and enforce secure coding practices to handle such inputs safely.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TQtC
Date Reserved
2025-09-19T14:01:04.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dfe0218ea44fea9ba2abad

Added to database: 10/3/2025, 2:39:29 PM

Last enriched: 10/3/2025, 2:39:45 PM

Last updated: 10/4/2025, 10:58:32 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by

Join the discussion: create a free account to comment and vote.

Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats