Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10728: CWE-674 Uncontrolled Recursion in The Qt Company Qt

0
Critical
VulnerabilityCVE-2025-10728cvecve-2025-10728cwe-674
Published: Fri Oct 03 2025 (10/03/2025, 14:35:02 UTC)
Source: CVE Database V5
Vendor/Project: The Qt Company
Product: Qt

Description

When the module renders a Svg file that contains a <pattern> element, it might end up rendering it recursively leading to stack overflow DoS

AI-Powered Analysis

AILast updated: 10/10/2025, 15:57:22 UTC

Technical Analysis

CVE-2025-10728 is a critical security vulnerability identified in The Qt Company’s Qt framework, specifically affecting versions 6.7.0 and 6.9.0. The vulnerability arises from the module responsible for rendering SVG files, where the presence of a <pattern> element can cause uncontrolled recursion during rendering. This recursive rendering leads to a stack overflow condition, which can crash the application and cause a denial-of-service (DoS) state. The flaw is classified under CWE-674 (Uncontrolled Recursion), indicating that the software fails to properly limit recursive calls, exhausting the stack memory. The vulnerability does not require any authentication or user interaction, making it easier to exploit in scenarios where an attacker can supply or influence SVG content. The CVSS 4.0 score of 9.4 reflects the critical nature of this vulnerability, with high impacts on confidentiality, integrity, and availability, and a broad scope affecting all systems running the vulnerable Qt versions. Although no public exploits have been reported yet, the potential for exploitation is significant given Qt’s widespread use in cross-platform applications, embedded systems, and graphical user interfaces. The vulnerability could be leveraged by attackers to disrupt services, crash applications, or potentially escalate attacks by causing instability in affected systems.

Potential Impact

For European organizations, the impact of CVE-2025-10728 is substantial due to the extensive use of the Qt framework in various industries including automotive, telecommunications, industrial automation, and software development. A successful exploitation could lead to denial-of-service conditions, disrupting critical services and applications that rely on Qt for rendering SVG graphics. This can affect user-facing applications, embedded devices, and backend systems, potentially causing operational downtime and loss of productivity. The vulnerability’s ability to affect confidentiality and integrity stems from the possibility of crashing applications that handle sensitive data, which might lead to unintended data exposure or corruption during recovery. Given the critical severity and ease of exploitation without authentication or user interaction, attackers could automate attacks against vulnerable systems. This poses a risk to sectors with high reliance on graphical interfaces and embedded Qt components, including financial services, healthcare, and manufacturing within Europe. The disruption could also have cascading effects on supply chains and critical infrastructure, especially in countries with advanced technology sectors.

Mitigation Recommendations

1. Monitor The Qt Company’s official channels for patches addressing CVE-2025-10728 and apply updates promptly once released. 2. Until patches are available, implement strict input validation to block or sanitize SVG files containing <pattern> elements from untrusted sources. 3. Employ sandboxing or containerization techniques for applications that process SVG files to limit the impact of potential crashes. 4. Use runtime application self-protection (RASP) or behavior monitoring tools to detect abnormal recursion or stack overflow conditions during SVG rendering. 5. Restrict the use of SVG rendering in environments where it is not essential, or replace SVG rendering with safer alternatives if feasible. 6. Conduct thorough testing of applications using Qt 6.7.0 or 6.9.0 to identify and mitigate any crash scenarios related to SVG processing. 7. Prepare incident response plans specifically for DoS attacks targeting graphical rendering components. 8. Educate developers and system administrators about the risks of uncontrolled recursion in SVG rendering and encourage secure coding practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TQtC
Date Reserved
2025-09-19T14:01:04.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dfe0218ea44fea9ba2abad

Added to database: 10/3/2025, 2:39:29 PM

Last enriched: 10/10/2025, 3:57:22 PM

Last updated: 11/14/2025, 4:24:46 AM

Views: 165

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats