CVE-2025-5455: CWE-20 Improper Input Validation in The Qt Company Qt
An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code. If the function was called with malformed data, for example, an URL that contained a "charset" parameter that lacked a value (such as "data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service (abort). This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.
AI Analysis
Technical Summary
CVE-2025-5455 is a high-severity vulnerability identified in the Qt framework, specifically within the private API function qDecodeDataUrl() in the QtCore module. This function is utilized internally by components such as QTextDocument and QNetworkReply, and may also be invoked in user applications that leverage Qt for handling data URLs. The vulnerability arises from improper input validation (CWE-20) when processing malformed data URLs, particularly those containing a 'charset' parameter without an assigned value (e.g., 'data:charset,'). When Qt is compiled with assertions enabled, encountering such malformed input triggers an assertion failure, causing the application to abort unexpectedly. This results in a denial of service (DoS) condition. The affected versions include Qt up to 5.15.18, all versions from 6.0.0 through 6.5.8, 6.6.0 through 6.8.3, and 6.9.0. The issue has been addressed in Qt versions 5.15.19, 6.5.9, 6.8.4, and 6.9.1. The CVSS 4.0 base score of 8.4 reflects the vulnerability's high impact, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability does not compromise confidentiality or integrity but severely impacts availability by causing application crashes. No known exploits are currently reported in the wild. The vulnerability's root cause is insufficient validation of input parameters in the qDecodeDataUrl() function, which should be hardened to handle malformed data gracefully without triggering assertions.
Potential Impact
For European organizations, the impact of CVE-2025-5455 can be significant, especially for those relying on Qt-based applications or custom software built on the Qt framework. The denial of service triggered by malformed data URLs can disrupt critical services, particularly in sectors such as finance, healthcare, telecommunications, and industrial control systems where Qt is commonly used for GUI and network communication layers. The requirement for user interaction implies that exploitation may occur through crafted URLs delivered via email, web content, or other user-facing interfaces, potentially leading to application crashes and service interruptions. This can result in operational downtime, loss of productivity, and potential reputational damage. Additionally, embedded systems and IoT devices in European infrastructure using vulnerable Qt versions may be susceptible, affecting availability of essential services. Although no known exploits exist yet, the ease of triggering the DoS via network vectors and low complexity makes it a credible threat that organizations should proactively address.
Mitigation Recommendations
European organizations should prioritize upgrading Qt libraries to the fixed versions: 5.15.19, 6.5.9, 6.8.4, or 6.9.1 depending on their current deployment. For applications where immediate upgrade is not feasible, implement input validation and sanitization at the application layer to detect and reject malformed data URLs before they reach the vulnerable qDecodeDataUrl() function. Employ runtime monitoring and anomaly detection to identify unexpected application crashes potentially caused by malformed inputs. Disable assertions in production builds if possible, as assertions trigger the abort, although this is a temporary workaround and not a substitute for patching. Conduct thorough code audits for any custom usage of qDecodeDataUrl() or similar data URL processing functions to ensure robust error handling. Additionally, educate users and administrators about the risks of interacting with untrusted URLs and implement network-level filtering to block suspicious data URL patterns. Maintain an incident response plan to quickly address any DoS incidents arising from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-5455: CWE-20 Improper Input Validation in The Qt Company Qt
Description
An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code. If the function was called with malformed data, for example, an URL that contained a "charset" parameter that lacked a value (such as "data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service (abort). This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-5455 is a high-severity vulnerability identified in the Qt framework, specifically within the private API function qDecodeDataUrl() in the QtCore module. This function is utilized internally by components such as QTextDocument and QNetworkReply, and may also be invoked in user applications that leverage Qt for handling data URLs. The vulnerability arises from improper input validation (CWE-20) when processing malformed data URLs, particularly those containing a 'charset' parameter without an assigned value (e.g., 'data:charset,'). When Qt is compiled with assertions enabled, encountering such malformed input triggers an assertion failure, causing the application to abort unexpectedly. This results in a denial of service (DoS) condition. The affected versions include Qt up to 5.15.18, all versions from 6.0.0 through 6.5.8, 6.6.0 through 6.8.3, and 6.9.0. The issue has been addressed in Qt versions 5.15.19, 6.5.9, 6.8.4, and 6.9.1. The CVSS 4.0 base score of 8.4 reflects the vulnerability's high impact, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability does not compromise confidentiality or integrity but severely impacts availability by causing application crashes. No known exploits are currently reported in the wild. The vulnerability's root cause is insufficient validation of input parameters in the qDecodeDataUrl() function, which should be hardened to handle malformed data gracefully without triggering assertions.
Potential Impact
For European organizations, the impact of CVE-2025-5455 can be significant, especially for those relying on Qt-based applications or custom software built on the Qt framework. The denial of service triggered by malformed data URLs can disrupt critical services, particularly in sectors such as finance, healthcare, telecommunications, and industrial control systems where Qt is commonly used for GUI and network communication layers. The requirement for user interaction implies that exploitation may occur through crafted URLs delivered via email, web content, or other user-facing interfaces, potentially leading to application crashes and service interruptions. This can result in operational downtime, loss of productivity, and potential reputational damage. Additionally, embedded systems and IoT devices in European infrastructure using vulnerable Qt versions may be susceptible, affecting availability of essential services. Although no known exploits exist yet, the ease of triggering the DoS via network vectors and low complexity makes it a credible threat that organizations should proactively address.
Mitigation Recommendations
European organizations should prioritize upgrading Qt libraries to the fixed versions: 5.15.19, 6.5.9, 6.8.4, or 6.9.1 depending on their current deployment. For applications where immediate upgrade is not feasible, implement input validation and sanitization at the application layer to detect and reject malformed data URLs before they reach the vulnerable qDecodeDataUrl() function. Employ runtime monitoring and anomaly detection to identify unexpected application crashes potentially caused by malformed inputs. Disable assertions in production builds if possible, as assertions trigger the abort, although this is a temporary workaround and not a substitute for patching. Conduct thorough code audits for any custom usage of qDecodeDataUrl() or similar data URL processing functions to ensure robust error handling. Additionally, educate users and administrators about the risks of interacting with untrusted URLs and implement network-level filtering to block suspicious data URL patterns. Maintain an incident response plan to quickly address any DoS incidents arising from this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TQtC
- Date Reserved
- 2025-06-02T08:31:36.081Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683d67c1182aa0cae23c2b24
Added to database: 6/2/2025, 8:58:41 AM
Last enriched: 7/9/2025, 12:55:01 PM
Last updated: 8/11/2025, 9:11:27 PM
Views: 11
Related Threats
CVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumCVE-2025-8091: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ashanjay EventON – Events Calendar
MediumCVE-2025-8080: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alobaidi Alobaidi Captcha
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.