CVE-2025-5991: CWE-416 Use After Free in The Qt Company Qt
There is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a POST request and the simultaneous handling of HTTP error responses. This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.
AI Analysis
Technical Summary
CVE-2025-5991 is a Use After Free (UAF) vulnerability identified in the Qt framework, specifically within the QHttp2ProtocolHandler component of the QtNetwork module. This vulnerability affects only Qt version 6.9.0 and pertains exclusively to HTTP/2 protocol handling; HTTP/1.x handling remains unaffected. The root cause is a race condition between the QHttp2Stream's process of uploading the body of a POST request and the concurrent handling of HTTP error responses. This race condition can lead to the premature freeing of memory that is still in use, resulting in a Use After Free scenario. Exploiting this vulnerability could potentially allow an attacker to cause application crashes or execute arbitrary code, depending on how the freed memory is manipulated. However, the CVSS 4.0 score assigned is 2.1, indicating a low severity level, primarily due to the requirement for local access (AV:L), high attack complexity (AC:H), and no privileges or user interaction needed. The vulnerability was fixed in Qt version 6.9.1, and no known exploits are currently reported in the wild. The vulnerability is classified under CWE-416, which covers Use After Free errors, a common memory corruption issue that can lead to serious security implications if exploited successfully.
Potential Impact
For European organizations, the impact of CVE-2025-5991 is generally low but should not be disregarded. Qt is widely used in various applications, including embedded systems, industrial control software, and cross-platform desktop applications. Organizations relying on Qt 6.9.0 for software that handles HTTP/2 traffic could face risks of application instability or potential exploitation if attackers can trigger the race condition. Although the vulnerability requires local access and has high attack complexity, targeted attacks in sensitive environments—such as critical infrastructure, manufacturing, or telecommunications—could leverage this flaw to disrupt services or gain a foothold for further exploitation. The low CVSS score suggests limited immediate risk, but the presence of a Use After Free bug always warrants attention due to the potential for escalation if combined with other vulnerabilities. European organizations should assess their use of Qt 6.9.0, especially in network-facing applications that process HTTP/2 requests, to avoid unexpected downtime or security breaches.
Mitigation Recommendations
1. Immediate upgrade to Qt version 6.9.1 or later, where the vulnerability has been patched, is the most effective mitigation. 2. Conduct an inventory of all applications and systems using Qt 6.9.0, focusing on those that handle HTTP/2 traffic, and prioritize patching or replacement. 3. Implement strict access controls to limit local access to systems running vulnerable Qt versions, reducing the risk of exploitation. 4. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) to reduce the impact of Use After Free vulnerabilities. 5. Monitor application logs and network traffic for unusual POST request patterns or HTTP error responses that could indicate attempts to trigger the race condition. 6. For embedded or legacy systems where upgrading Qt is not immediately feasible, consider disabling HTTP/2 support if possible or isolating affected systems from untrusted networks. 7. Maintain up-to-date threat intelligence feeds to detect any emerging exploits targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-5991: CWE-416 Use After Free in The Qt Company Qt
Description
There is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a POST request and the simultaneous handling of HTTP error responses. This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-5991 is a Use After Free (UAF) vulnerability identified in the Qt framework, specifically within the QHttp2ProtocolHandler component of the QtNetwork module. This vulnerability affects only Qt version 6.9.0 and pertains exclusively to HTTP/2 protocol handling; HTTP/1.x handling remains unaffected. The root cause is a race condition between the QHttp2Stream's process of uploading the body of a POST request and the concurrent handling of HTTP error responses. This race condition can lead to the premature freeing of memory that is still in use, resulting in a Use After Free scenario. Exploiting this vulnerability could potentially allow an attacker to cause application crashes or execute arbitrary code, depending on how the freed memory is manipulated. However, the CVSS 4.0 score assigned is 2.1, indicating a low severity level, primarily due to the requirement for local access (AV:L), high attack complexity (AC:H), and no privileges or user interaction needed. The vulnerability was fixed in Qt version 6.9.1, and no known exploits are currently reported in the wild. The vulnerability is classified under CWE-416, which covers Use After Free errors, a common memory corruption issue that can lead to serious security implications if exploited successfully.
Potential Impact
For European organizations, the impact of CVE-2025-5991 is generally low but should not be disregarded. Qt is widely used in various applications, including embedded systems, industrial control software, and cross-platform desktop applications. Organizations relying on Qt 6.9.0 for software that handles HTTP/2 traffic could face risks of application instability or potential exploitation if attackers can trigger the race condition. Although the vulnerability requires local access and has high attack complexity, targeted attacks in sensitive environments—such as critical infrastructure, manufacturing, or telecommunications—could leverage this flaw to disrupt services or gain a foothold for further exploitation. The low CVSS score suggests limited immediate risk, but the presence of a Use After Free bug always warrants attention due to the potential for escalation if combined with other vulnerabilities. European organizations should assess their use of Qt 6.9.0, especially in network-facing applications that process HTTP/2 requests, to avoid unexpected downtime or security breaches.
Mitigation Recommendations
1. Immediate upgrade to Qt version 6.9.1 or later, where the vulnerability has been patched, is the most effective mitigation. 2. Conduct an inventory of all applications and systems using Qt 6.9.0, focusing on those that handle HTTP/2 traffic, and prioritize patching or replacement. 3. Implement strict access controls to limit local access to systems running vulnerable Qt versions, reducing the risk of exploitation. 4. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) to reduce the impact of Use After Free vulnerabilities. 5. Monitor application logs and network traffic for unusual POST request patterns or HTTP error responses that could indicate attempts to trigger the race condition. 6. For embedded or legacy systems where upgrading Qt is not immediately feasible, consider disabling HTTP/2 support if possible or isolating affected systems from untrusted networks. 7. Maintain up-to-date threat intelligence feeds to detect any emerging exploits targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TQtC
- Date Reserved
- 2025-06-11T06:08:23.434Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6849339d72c9cfbdf1192f41
Added to database: 6/11/2025, 7:43:25 AM
Last enriched: 7/12/2025, 5:17:46 AM
Last updated: 11/20/2025, 1:42:45 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13468: Missing Authorization in SourceCodester Alumni Management System
MediumCVE-2025-0643: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Narkom Communication and Software Technologies Trade Ltd. Co. Pyxis Signage
HighCVE-2025-40601: CWE-121 Stack-based Buffer Overflow in SonicWall SonicOS
UnknownCVE-2025-40605: CWE-23 Relative Path Traversal in SonicWall Email Security
UnknownCVE-2025-40604: CWE-494 Download of Code Without Integrity Check in SonicWall Email Security
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.