CVE-2025-5992: CWE-20 Improper Input Validation in The Qt Company Qt
When passing values outside of the expected range to QColorTransferGenericFunction it can cause a denial of service, for example, this can happen when passing a specifically crafted ICC profile to QColorSpace::fromICCProfile.This issue affects Qt from 6.6.0 through 6.8.3, from 6.9.0 through 6.9.1. This is fixed in 6.8.4 and 6.9.2.
AI Analysis
Technical Summary
CVE-2025-5992 is a vulnerability identified in The Qt Company's Qt framework, specifically affecting versions 6.6.0 through 6.8.3 and 6.9.0 through 6.9.1. The issue stems from improper input validation (CWE-20) in the QColorTransferGenericFunction component. When values outside the expected range are passed to this function, it can lead to a denial of service (DoS) condition. A practical exploitation vector involves supplying a specially crafted ICC (International Color Consortium) profile to the QColorSpace::fromICCProfile method, which triggers the vulnerability. This flaw allows an attacker to cause the affected application or system to crash or become unresponsive by exploiting the improper handling of color profile data. The vulnerability has been addressed and fixed in Qt versions 6.8.4 and 6.9.2. The CVSS v4.0 base score is 2.3, indicating a low severity level, primarily because the attack requires user interaction (UI:P), has high attack complexity (AC:H), and does not require privileges or authentication. There are no known exploits in the wild at this time. The vulnerability impacts the confidentiality, integrity, and availability minimally, with the primary concern being availability due to potential denial of service. The scope is limited to applications using the affected Qt versions and specifically those that process ICC profiles via the vulnerable functions. The vulnerability does not propagate beyond the vulnerable component, and no privilege escalation or code execution is indicated.
Potential Impact
For European organizations, the impact of CVE-2025-5992 is generally limited but should not be overlooked. Qt is widely used in various software applications, including embedded systems, desktop applications, and some industrial control systems. Organizations that rely on software built with the affected Qt versions and that process ICC profiles—such as graphic design tools, printing software, or multimedia applications—may experience service disruptions if targeted. A denial of service could lead to temporary loss of availability of critical applications, potentially affecting productivity or operational continuity. While the severity is low, sectors with high availability requirements, such as healthcare, manufacturing, or transportation, could face operational challenges if the vulnerability is exploited. However, the need for user interaction and high attack complexity reduces the likelihood of widespread exploitation. The absence of known exploits in the wild further lowers immediate risk but does not eliminate the need for vigilance and patching.
Mitigation Recommendations
European organizations should prioritize updating Qt to versions 6.8.4 or 6.9.2 or later to remediate this vulnerability. Beyond patching, organizations should implement strict input validation and sanitization for all user-supplied data, especially when handling ICC profiles or other external color profile data. Application developers should audit their use of Qt's color management APIs to ensure they do not process untrusted ICC profiles without validation. Employing application-layer sandboxing or containerization can limit the impact of potential crashes caused by malformed inputs. Monitoring application logs for crashes or unusual behavior related to color profile processing can help detect attempted exploitation. Additionally, organizations should educate users about the risks of opening untrusted files, particularly ICC profiles embedded in documents or images. For embedded or industrial systems using Qt, firmware or software updates should be tested and deployed promptly to minimize exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-5992: CWE-20 Improper Input Validation in The Qt Company Qt
Description
When passing values outside of the expected range to QColorTransferGenericFunction it can cause a denial of service, for example, this can happen when passing a specifically crafted ICC profile to QColorSpace::fromICCProfile.This issue affects Qt from 6.6.0 through 6.8.3, from 6.9.0 through 6.9.1. This is fixed in 6.8.4 and 6.9.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-5992 is a vulnerability identified in The Qt Company's Qt framework, specifically affecting versions 6.6.0 through 6.8.3 and 6.9.0 through 6.9.1. The issue stems from improper input validation (CWE-20) in the QColorTransferGenericFunction component. When values outside the expected range are passed to this function, it can lead to a denial of service (DoS) condition. A practical exploitation vector involves supplying a specially crafted ICC (International Color Consortium) profile to the QColorSpace::fromICCProfile method, which triggers the vulnerability. This flaw allows an attacker to cause the affected application or system to crash or become unresponsive by exploiting the improper handling of color profile data. The vulnerability has been addressed and fixed in Qt versions 6.8.4 and 6.9.2. The CVSS v4.0 base score is 2.3, indicating a low severity level, primarily because the attack requires user interaction (UI:P), has high attack complexity (AC:H), and does not require privileges or authentication. There are no known exploits in the wild at this time. The vulnerability impacts the confidentiality, integrity, and availability minimally, with the primary concern being availability due to potential denial of service. The scope is limited to applications using the affected Qt versions and specifically those that process ICC profiles via the vulnerable functions. The vulnerability does not propagate beyond the vulnerable component, and no privilege escalation or code execution is indicated.
Potential Impact
For European organizations, the impact of CVE-2025-5992 is generally limited but should not be overlooked. Qt is widely used in various software applications, including embedded systems, desktop applications, and some industrial control systems. Organizations that rely on software built with the affected Qt versions and that process ICC profiles—such as graphic design tools, printing software, or multimedia applications—may experience service disruptions if targeted. A denial of service could lead to temporary loss of availability of critical applications, potentially affecting productivity or operational continuity. While the severity is low, sectors with high availability requirements, such as healthcare, manufacturing, or transportation, could face operational challenges if the vulnerability is exploited. However, the need for user interaction and high attack complexity reduces the likelihood of widespread exploitation. The absence of known exploits in the wild further lowers immediate risk but does not eliminate the need for vigilance and patching.
Mitigation Recommendations
European organizations should prioritize updating Qt to versions 6.8.4 or 6.9.2 or later to remediate this vulnerability. Beyond patching, organizations should implement strict input validation and sanitization for all user-supplied data, especially when handling ICC profiles or other external color profile data. Application developers should audit their use of Qt's color management APIs to ensure they do not process untrusted ICC profiles without validation. Employing application-layer sandboxing or containerization can limit the impact of potential crashes caused by malformed inputs. Monitoring application logs for crashes or unusual behavior related to color profile processing can help detect attempted exploitation. Additionally, organizations should educate users about the risks of opening untrusted files, particularly ICC profiles embedded in documents or images. For embedded or industrial systems using Qt, firmware or software updates should be tested and deployed promptly to minimize exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TQtC
- Date Reserved
- 2025-06-11T06:08:27.335Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6870b6b3a83201eaacacdbda
Added to database: 7/11/2025, 7:01:07 AM
Last enriched: 7/11/2025, 7:16:32 AM
Last updated: 8/22/2025, 11:39:33 AM
Views: 26
Related Threats
CVE-2025-9358: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-5352: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lunary-ai lunary-ai/lunary
HighCVE-2025-9357: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-7813: CWE-918 Server-Side Request Forgery (SSRF) in arraytics Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin
HighCVE-2025-43764: CWE-1333 Inefficient Regular Expression Complexity in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.