CVE-2025-5991: CWE-416 Use After Free in The Qt Company Qt
There is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a POST request and the simultaneous handling of HTTP error responses. This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.
AI Analysis
Technical Summary
CVE-2025-5991 is a Use After Free (UAF) vulnerability identified in the Qt framework, specifically within the QHttp2ProtocolHandler component of the QtNetwork module. This vulnerability affects only Qt version 6.9.0 and pertains exclusively to HTTP/2 protocol handling; HTTP/1.x handling remains unaffected. The root cause is a race condition between the QHttp2Stream's process of uploading the body of a POST request and the concurrent handling of HTTP error responses. This race condition can lead to the premature freeing of memory that is still in use, resulting in a Use After Free scenario. Exploiting this vulnerability could potentially allow an attacker to cause application crashes or execute arbitrary code, depending on how the freed memory is manipulated. However, the CVSS 4.0 score assigned is 2.1, indicating a low severity level, primarily due to the requirement for local access (AV:L), high attack complexity (AC:H), and no privileges or user interaction needed. The vulnerability was fixed in Qt version 6.9.1, and no known exploits are currently reported in the wild. The vulnerability is classified under CWE-416, which covers Use After Free errors, a common memory corruption issue that can lead to serious security implications if exploited successfully.
Potential Impact
For European organizations, the impact of CVE-2025-5991 is generally low but should not be disregarded. Qt is widely used in various applications, including embedded systems, industrial control software, and cross-platform desktop applications. Organizations relying on Qt 6.9.0 for software that handles HTTP/2 traffic could face risks of application instability or potential exploitation if attackers can trigger the race condition. Although the vulnerability requires local access and has high attack complexity, targeted attacks in sensitive environments—such as critical infrastructure, manufacturing, or telecommunications—could leverage this flaw to disrupt services or gain a foothold for further exploitation. The low CVSS score suggests limited immediate risk, but the presence of a Use After Free bug always warrants attention due to the potential for escalation if combined with other vulnerabilities. European organizations should assess their use of Qt 6.9.0, especially in network-facing applications that process HTTP/2 requests, to avoid unexpected downtime or security breaches.
Mitigation Recommendations
1. Immediate upgrade to Qt version 6.9.1 or later, where the vulnerability has been patched, is the most effective mitigation. 2. Conduct an inventory of all applications and systems using Qt 6.9.0, focusing on those that handle HTTP/2 traffic, and prioritize patching or replacement. 3. Implement strict access controls to limit local access to systems running vulnerable Qt versions, reducing the risk of exploitation. 4. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) to reduce the impact of Use After Free vulnerabilities. 5. Monitor application logs and network traffic for unusual POST request patterns or HTTP error responses that could indicate attempts to trigger the race condition. 6. For embedded or legacy systems where upgrading Qt is not immediately feasible, consider disabling HTTP/2 support if possible or isolating affected systems from untrusted networks. 7. Maintain up-to-date threat intelligence feeds to detect any emerging exploits targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-5991: CWE-416 Use After Free in The Qt Company Qt
Description
There is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a POST request and the simultaneous handling of HTTP error responses. This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-5991 is a Use After Free (UAF) vulnerability identified in the Qt framework, specifically within the QHttp2ProtocolHandler component of the QtNetwork module. This vulnerability affects only Qt version 6.9.0 and pertains exclusively to HTTP/2 protocol handling; HTTP/1.x handling remains unaffected. The root cause is a race condition between the QHttp2Stream's process of uploading the body of a POST request and the concurrent handling of HTTP error responses. This race condition can lead to the premature freeing of memory that is still in use, resulting in a Use After Free scenario. Exploiting this vulnerability could potentially allow an attacker to cause application crashes or execute arbitrary code, depending on how the freed memory is manipulated. However, the CVSS 4.0 score assigned is 2.1, indicating a low severity level, primarily due to the requirement for local access (AV:L), high attack complexity (AC:H), and no privileges or user interaction needed. The vulnerability was fixed in Qt version 6.9.1, and no known exploits are currently reported in the wild. The vulnerability is classified under CWE-416, which covers Use After Free errors, a common memory corruption issue that can lead to serious security implications if exploited successfully.
Potential Impact
For European organizations, the impact of CVE-2025-5991 is generally low but should not be disregarded. Qt is widely used in various applications, including embedded systems, industrial control software, and cross-platform desktop applications. Organizations relying on Qt 6.9.0 for software that handles HTTP/2 traffic could face risks of application instability or potential exploitation if attackers can trigger the race condition. Although the vulnerability requires local access and has high attack complexity, targeted attacks in sensitive environments—such as critical infrastructure, manufacturing, or telecommunications—could leverage this flaw to disrupt services or gain a foothold for further exploitation. The low CVSS score suggests limited immediate risk, but the presence of a Use After Free bug always warrants attention due to the potential for escalation if combined with other vulnerabilities. European organizations should assess their use of Qt 6.9.0, especially in network-facing applications that process HTTP/2 requests, to avoid unexpected downtime or security breaches.
Mitigation Recommendations
1. Immediate upgrade to Qt version 6.9.1 or later, where the vulnerability has been patched, is the most effective mitigation. 2. Conduct an inventory of all applications and systems using Qt 6.9.0, focusing on those that handle HTTP/2 traffic, and prioritize patching or replacement. 3. Implement strict access controls to limit local access to systems running vulnerable Qt versions, reducing the risk of exploitation. 4. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) to reduce the impact of Use After Free vulnerabilities. 5. Monitor application logs and network traffic for unusual POST request patterns or HTTP error responses that could indicate attempts to trigger the race condition. 6. For embedded or legacy systems where upgrading Qt is not immediately feasible, consider disabling HTTP/2 support if possible or isolating affected systems from untrusted networks. 7. Maintain up-to-date threat intelligence feeds to detect any emerging exploits targeting this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TQtC
- Date Reserved
- 2025-06-11T06:08:23.434Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6849339d72c9cfbdf1192f41
Added to database: 6/11/2025, 7:43:25 AM
Last enriched: 7/12/2025, 5:17:46 AM
Last updated: 1/7/2026, 4:53:46 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.