Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12385: CWE-770 Allocation of Resources Without Limits or Throttling in The Qt Company Qt

0
High
VulnerabilityCVE-2025-12385cvecve-2025-12385cwe-770cwe-1284
Published: Wed Dec 03 2025 (12/03/2025, 19:38:53 UTC)
Source: CVE Database V5
Vendor/Project: The Qt Company
Product: Qt

Description

Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation. This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive. This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.

AI-Powered Analysis

AILast updated: 12/03/2025, 19:59:58 UTC

Technical Analysis

CVE-2025-12385 is a resource exhaustion vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-1284 (Improper Validation of Specified Quantity in Input) affecting The Qt Company’s Qt framework. The vulnerability specifically targets the Text component in Qt Quick, where the width and height attributes of the <img> tag are not properly validated. This allows an attacker to specify excessively large dimensions for images, causing the application to allocate excessive memory or processing resources. The flaw affects multiple platforms including Windows, macOS, Linux, iOS, Android, and architectures such as x86, ARM, 64-bit, and 32-bit, covering a broad range of devices and environments. The affected Qt versions span from 5.0.0 through 6.5.10, 6.6.0 through 6.8.5, and 6.9.0 through 6.10.0, indicating that many deployed applications may be vulnerable. Exploitation requires no privileges or user interaction and can be triggered remotely by supplying malicious input that includes crafted <img> tags with large dimension values. The result is an application becoming unresponsive, effectively a denial-of-service condition. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no authentication or user interaction, no confidentiality or integrity impact, but high availability impact. No patches are currently linked, and no exploits are known in the wild, but the severity and ease of exploitation make this a critical issue for developers and organizations relying on Qt. The vulnerability underscores the importance of input validation and resource management in UI components that process external data.

Potential Impact

For European organizations, the primary impact is denial of service due to application unresponsiveness, which can disrupt business operations, especially for software products or services built on Qt. Industries relying on embedded systems, IoT devices, automotive software, and cross-platform applications are particularly at risk. The vulnerability could be exploited to degrade service availability in customer-facing applications or critical infrastructure management tools. Given Qt’s widespread use in various sectors, including telecommunications, automotive, industrial automation, and consumer electronics, the impact could extend to critical services and supply chains. The lack of authentication or user interaction requirements means attackers can remotely trigger the vulnerability, increasing the risk of widespread disruption. Additionally, organizations may face reputational damage and compliance challenges if service outages affect end users or violate service-level agreements. The broad platform support means that both desktop and mobile applications in Europe are vulnerable, amplifying the potential operational impact.

Mitigation Recommendations

Organizations should prioritize updating Qt to patched versions once they become available from The Qt Company. Until patches are released, developers should implement strict input validation and sanitization on any user-supplied content that includes <img> tags or other UI elements capable of specifying resource-intensive attributes. Application-level throttling or limits on image dimensions should be enforced to prevent excessive resource allocation. Monitoring application performance and resource usage can help detect anomalous behavior indicative of exploitation attempts. For embedded or IoT devices where updates may be slower, network-level protections such as web application firewalls (WAFs) can be configured to block or limit suspicious payloads containing large dimension attributes. Security teams should also review their software supply chain to identify Qt usage and prioritize remediation accordingly. Finally, educating developers about secure coding practices related to resource management and input validation in UI components will reduce future risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TQtC
Date Reserved
2025-10-28T11:53:25.141Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6930935d728fb3f62eb0af7f

Added to database: 12/3/2025, 7:45:33 PM

Last enriched: 12/3/2025, 7:59:58 PM

Last updated: 12/5/2025, 2:20:07 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats