CVE-2025-12385: CWE-770 Allocation of Resources Without Limits or Throttling in The Qt Company Qt
Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation. This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive. This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.
AI Analysis
Technical Summary
CVE-2025-12385 is a resource exhaustion vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-1284 (Improper Validation of Specified Quantity in Input) affecting The Qt Company’s Qt framework. The vulnerability specifically targets the Text component in Qt Quick, where the width and height attributes of the <img> tag are not properly validated. This allows an attacker to specify excessively large dimensions for images, causing the application to allocate excessive memory or processing resources. The flaw affects multiple platforms including Windows, macOS, Linux, iOS, Android, and architectures such as x86, ARM, 64-bit, and 32-bit, covering a broad range of devices and environments. The affected Qt versions span from 5.0.0 through 6.5.10, 6.6.0 through 6.8.5, and 6.9.0 through 6.10.0, indicating that many deployed applications may be vulnerable. Exploitation requires no privileges or user interaction and can be triggered remotely by supplying malicious input that includes crafted <img> tags with large dimension values. The result is an application becoming unresponsive, effectively a denial-of-service condition. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no authentication or user interaction, no confidentiality or integrity impact, but high availability impact. No patches are currently linked, and no exploits are known in the wild, but the severity and ease of exploitation make this a critical issue for developers and organizations relying on Qt. The vulnerability underscores the importance of input validation and resource management in UI components that process external data.
Potential Impact
For European organizations, the primary impact is denial of service due to application unresponsiveness, which can disrupt business operations, especially for software products or services built on Qt. Industries relying on embedded systems, IoT devices, automotive software, and cross-platform applications are particularly at risk. The vulnerability could be exploited to degrade service availability in customer-facing applications or critical infrastructure management tools. Given Qt’s widespread use in various sectors, including telecommunications, automotive, industrial automation, and consumer electronics, the impact could extend to critical services and supply chains. The lack of authentication or user interaction requirements means attackers can remotely trigger the vulnerability, increasing the risk of widespread disruption. Additionally, organizations may face reputational damage and compliance challenges if service outages affect end users or violate service-level agreements. The broad platform support means that both desktop and mobile applications in Europe are vulnerable, amplifying the potential operational impact.
Mitigation Recommendations
Organizations should prioritize updating Qt to patched versions once they become available from The Qt Company. Until patches are released, developers should implement strict input validation and sanitization on any user-supplied content that includes <img> tags or other UI elements capable of specifying resource-intensive attributes. Application-level throttling or limits on image dimensions should be enforced to prevent excessive resource allocation. Monitoring application performance and resource usage can help detect anomalous behavior indicative of exploitation attempts. For embedded or IoT devices where updates may be slower, network-level protections such as web application firewalls (WAFs) can be configured to block or limit suspicious payloads containing large dimension attributes. Security teams should also review their software supply chain to identify Qt usage and prioritize remediation accordingly. Finally, educating developers about secure coding practices related to resource management and input validation in UI components will reduce future risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-12385: CWE-770 Allocation of Resources Without Limits or Throttling in The Qt Company Qt
Description
Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation. This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive. This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-12385 is a resource exhaustion vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-1284 (Improper Validation of Specified Quantity in Input) affecting The Qt Company’s Qt framework. The vulnerability specifically targets the Text component in Qt Quick, where the width and height attributes of the <img> tag are not properly validated. This allows an attacker to specify excessively large dimensions for images, causing the application to allocate excessive memory or processing resources. The flaw affects multiple platforms including Windows, macOS, Linux, iOS, Android, and architectures such as x86, ARM, 64-bit, and 32-bit, covering a broad range of devices and environments. The affected Qt versions span from 5.0.0 through 6.5.10, 6.6.0 through 6.8.5, and 6.9.0 through 6.10.0, indicating that many deployed applications may be vulnerable. Exploitation requires no privileges or user interaction and can be triggered remotely by supplying malicious input that includes crafted <img> tags with large dimension values. The result is an application becoming unresponsive, effectively a denial-of-service condition. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no authentication or user interaction, no confidentiality or integrity impact, but high availability impact. No patches are currently linked, and no exploits are known in the wild, but the severity and ease of exploitation make this a critical issue for developers and organizations relying on Qt. The vulnerability underscores the importance of input validation and resource management in UI components that process external data.
Potential Impact
For European organizations, the primary impact is denial of service due to application unresponsiveness, which can disrupt business operations, especially for software products or services built on Qt. Industries relying on embedded systems, IoT devices, automotive software, and cross-platform applications are particularly at risk. The vulnerability could be exploited to degrade service availability in customer-facing applications or critical infrastructure management tools. Given Qt’s widespread use in various sectors, including telecommunications, automotive, industrial automation, and consumer electronics, the impact could extend to critical services and supply chains. The lack of authentication or user interaction requirements means attackers can remotely trigger the vulnerability, increasing the risk of widespread disruption. Additionally, organizations may face reputational damage and compliance challenges if service outages affect end users or violate service-level agreements. The broad platform support means that both desktop and mobile applications in Europe are vulnerable, amplifying the potential operational impact.
Mitigation Recommendations
Organizations should prioritize updating Qt to patched versions once they become available from The Qt Company. Until patches are released, developers should implement strict input validation and sanitization on any user-supplied content that includes <img> tags or other UI elements capable of specifying resource-intensive attributes. Application-level throttling or limits on image dimensions should be enforced to prevent excessive resource allocation. Monitoring application performance and resource usage can help detect anomalous behavior indicative of exploitation attempts. For embedded or IoT devices where updates may be slower, network-level protections such as web application firewalls (WAFs) can be configured to block or limit suspicious payloads containing large dimension attributes. Security teams should also review their software supply chain to identify Qt usage and prioritize remediation accordingly. Finally, educating developers about secure coding practices related to resource management and input validation in UI components will reduce future risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TQtC
- Date Reserved
- 2025-10-28T11:53:25.141Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6930935d728fb3f62eb0af7f
Added to database: 12/3/2025, 7:45:33 PM
Last enriched: 12/3/2025, 7:59:58 PM
Last updated: 12/5/2025, 2:20:07 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.