CVE-2025-5991: CWE-416 Use After Free in The Qt Company Qt
There is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a POST request and the simultaneous handling of HTTP error responses. This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.
AI Analysis
Technical Summary
CVE-2025-5991 is a Use After Free (UAF) vulnerability identified in the Qt framework, specifically within the QHttp2ProtocolHandler component of the QtNetwork module. This vulnerability affects only Qt version 6.9.0 and pertains exclusively to HTTP/2 protocol handling; HTTP/1.x handling remains unaffected. The root cause is a race condition between the QHttp2Stream's process of uploading the body of a POST request and the concurrent handling of HTTP error responses. This race condition can lead to the premature freeing of memory that is still in use, resulting in a Use After Free scenario. Exploiting this vulnerability could potentially allow an attacker to cause application crashes or execute arbitrary code, depending on how the freed memory is manipulated. However, the CVSS 4.0 score assigned is 2.1, indicating a low severity level, primarily due to the requirement for local access (AV:L), high attack complexity (AC:H), and no privileges or user interaction needed. The vulnerability was fixed in Qt version 6.9.1, and no known exploits are currently reported in the wild. The vulnerability is classified under CWE-416, which covers Use After Free errors, a common memory corruption issue that can lead to serious security implications if exploited successfully.
Potential Impact
For European organizations, the impact of CVE-2025-5991 is generally low but should not be disregarded. Qt is widely used in various applications, including embedded systems, industrial control software, and cross-platform desktop applications. Organizations relying on Qt 6.9.0 for software that handles HTTP/2 traffic could face risks of application instability or potential exploitation if attackers can trigger the race condition. Although the vulnerability requires local access and has high attack complexity, targeted attacks in sensitive environments—such as critical infrastructure, manufacturing, or telecommunications—could leverage this flaw to disrupt services or gain a foothold for further exploitation. The low CVSS score suggests limited immediate risk, but the presence of a Use After Free bug always warrants attention due to the potential for escalation if combined with other vulnerabilities. European organizations should assess their use of Qt 6.9.0, especially in network-facing applications that process HTTP/2 requests, to avoid unexpected downtime or security breaches.
Mitigation Recommendations
1. Immediate upgrade to Qt version 6.9.1 or later, where the vulnerability has been patched, is the most effective mitigation. 2. Conduct an inventory of all applications and systems using Qt 6.9.0, focusing on those that handle HTTP/2 traffic, and prioritize patching or replacement. 3. Implement strict access controls to limit local access to systems running vulnerable Qt versions, reducing the risk of exploitation. 4. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) to reduce the impact of Use After Free vulnerabilities. 5. Monitor application logs and network traffic for unusual POST request patterns or HTTP error responses that could indicate attempts to trigger the race condition. 6. For embedded or legacy systems where upgrading Qt is not immediately feasible, consider disabling HTTP/2 support if possible or isolating affected systems from untrusted networks. 7. Maintain up-to-date threat intelligence feeds to detect any emerging exploits targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-5991: CWE-416 Use After Free in The Qt Company Qt
Description
There is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a POST request and the simultaneous handling of HTTP error responses. This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-5991 is a Use After Free (UAF) vulnerability identified in the Qt framework, specifically within the QHttp2ProtocolHandler component of the QtNetwork module. This vulnerability affects only Qt version 6.9.0 and pertains exclusively to HTTP/2 protocol handling; HTTP/1.x handling remains unaffected. The root cause is a race condition between the QHttp2Stream's process of uploading the body of a POST request and the concurrent handling of HTTP error responses. This race condition can lead to the premature freeing of memory that is still in use, resulting in a Use After Free scenario. Exploiting this vulnerability could potentially allow an attacker to cause application crashes or execute arbitrary code, depending on how the freed memory is manipulated. However, the CVSS 4.0 score assigned is 2.1, indicating a low severity level, primarily due to the requirement for local access (AV:L), high attack complexity (AC:H), and no privileges or user interaction needed. The vulnerability was fixed in Qt version 6.9.1, and no known exploits are currently reported in the wild. The vulnerability is classified under CWE-416, which covers Use After Free errors, a common memory corruption issue that can lead to serious security implications if exploited successfully.
Potential Impact
For European organizations, the impact of CVE-2025-5991 is generally low but should not be disregarded. Qt is widely used in various applications, including embedded systems, industrial control software, and cross-platform desktop applications. Organizations relying on Qt 6.9.0 for software that handles HTTP/2 traffic could face risks of application instability or potential exploitation if attackers can trigger the race condition. Although the vulnerability requires local access and has high attack complexity, targeted attacks in sensitive environments—such as critical infrastructure, manufacturing, or telecommunications—could leverage this flaw to disrupt services or gain a foothold for further exploitation. The low CVSS score suggests limited immediate risk, but the presence of a Use After Free bug always warrants attention due to the potential for escalation if combined with other vulnerabilities. European organizations should assess their use of Qt 6.9.0, especially in network-facing applications that process HTTP/2 requests, to avoid unexpected downtime or security breaches.
Mitigation Recommendations
1. Immediate upgrade to Qt version 6.9.1 or later, where the vulnerability has been patched, is the most effective mitigation. 2. Conduct an inventory of all applications and systems using Qt 6.9.0, focusing on those that handle HTTP/2 traffic, and prioritize patching or replacement. 3. Implement strict access controls to limit local access to systems running vulnerable Qt versions, reducing the risk of exploitation. 4. Employ runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) to reduce the impact of Use After Free vulnerabilities. 5. Monitor application logs and network traffic for unusual POST request patterns or HTTP error responses that could indicate attempts to trigger the race condition. 6. For embedded or legacy systems where upgrading Qt is not immediately feasible, consider disabling HTTP/2 support if possible or isolating affected systems from untrusted networks. 7. Maintain up-to-date threat intelligence feeds to detect any emerging exploits targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TQtC
- Date Reserved
- 2025-06-11T06:08:23.434Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6849339d72c9cfbdf1192f41
Added to database: 6/11/2025, 7:43:25 AM
Last enriched: 7/12/2025, 5:17:46 AM
Last updated: 8/5/2025, 12:37:43 PM
Views: 20
Related Threats
CVE-2025-8100: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bdthemes Element Pack Addons for Elementor – Mega Menu, Header Footer, Dynamic Builder and Ready Templates
MediumCVE-2025-7498: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in timstrifler Exclusive Addons for Elementor
MediumCVE-2025-7399: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MuffinGroup Betheme
MediumCVE-2025-6994: CWE-269 Improper Privilege Management in SmartDataSoft Reveal Listing
CriticalCVE-2025-55027
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.