Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12385: CWE-770 Allocation of Resources Without Limits or Throttling in The Qt Company Qt

0
High
VulnerabilityCVE-2025-12385cvecve-2025-12385cwe-770cwe-1284
Published: Wed Dec 03 2025 (12/03/2025, 19:38:53 UTC)
Source: CVE Database V5
Vendor/Project: The Qt Company
Product: Qt

Description

Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation. This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive. This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.

AI-Powered Analysis

AILast updated: 12/10/2025, 20:00:25 UTC

Technical Analysis

CVE-2025-12385 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-1284 (Improper Validation of Specified Quantity in Input) affecting The Qt Company's Qt framework across Windows, MacOS, Linux, iOS, Android, and multiple CPU architectures (x86, ARM, 64-bit, 32-bit). The flaw resides in the Qt Quick Text component's handling of the <img> tag, where the width and height attributes are not properly validated. This lack of validation allows an attacker to specify excessively large dimensions, causing the application to allocate excessive memory or other resources without limits or throttling. The consequence is that the affected application can become unresponsive or crash, effectively resulting in a denial-of-service (DoS) condition. The vulnerability affects a broad range of Qt versions from 5.0.0 through 6.5.10, 6.6.0 through 6.8.5, and 6.9.0 through 6.10.0, indicating a long-standing issue across multiple releases. The CVSS 4.0 base score is 8.7 (high), reflecting the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on availability (VA:H). No known exploits have been reported in the wild yet, but the vulnerability's characteristics make it a prime candidate for exploitation in denial-of-service attacks. The vulnerability is particularly concerning for applications that render user-supplied or external content using Qt Quick Text components, as malicious actors could craft inputs that trigger excessive resource consumption remotely and without authentication.

Potential Impact

For European organizations, the impact of CVE-2025-12385 can be significant, especially for those relying on Qt-based applications in critical sectors such as finance, telecommunications, automotive, healthcare, and industrial control systems. The vulnerability can lead to application unavailability or crashes, disrupting business operations and potentially causing service outages. This is particularly critical for real-time or safety-critical systems where application responsiveness is essential. The broad platform and architecture support of Qt mean that many types of devices and endpoints could be affected, increasing the attack surface. Additionally, organizations developing software products using Qt may face reputational damage and increased support costs if their applications are vulnerable. The lack of required authentication and user interaction means attackers can exploit this remotely and at scale, increasing the risk of widespread denial-of-service attacks. While no exploits are currently known, the high CVSS score and ease of exploitation suggest that threat actors may develop exploits soon, emphasizing the need for proactive mitigation.

Mitigation Recommendations

1. Monitor The Qt Company's official channels for patches addressing CVE-2025-12385 and apply updates promptly once available. 2. Until patches are released, implement input validation and sanitization at the application level to restrict the width and height attributes in <img> tags to reasonable limits, preventing excessive resource allocation. 3. Employ application-layer resource throttling and timeout mechanisms to detect and mitigate unusually large or malformed inputs that could trigger the vulnerability. 4. Use runtime monitoring and anomaly detection tools to identify unusual memory or CPU usage patterns indicative of exploitation attempts. 5. For organizations developing Qt-based applications, review and harden the code handling user-supplied content, especially in UI components rendering images or external content. 6. Consider deploying Web Application Firewalls (WAFs) or network-level filters to block or rate-limit suspicious traffic targeting vulnerable endpoints. 7. Conduct security testing and fuzzing focused on the Qt Quick Text component to identify and remediate similar input validation issues proactively. 8. Educate developers and security teams about this vulnerability to ensure awareness and readiness to respond to potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TQtC
Date Reserved
2025-10-28T11:53:25.141Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6930935d728fb3f62eb0af7f

Added to database: 12/3/2025, 7:45:33 PM

Last enriched: 12/10/2025, 8:00:25 PM

Last updated: 1/18/2026, 5:13:14 PM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats