Project Subscriptions
No advisories yet.
Solution
Update to Qt 6.8.7 or Qt 6.10.2 or later. As a temporary mitigation, validate and sanitize all SVG files before loading them with VectorImage, or only load SVG files from trusted sources.
Workaround
No workaround given by the vendor.
Wed, 06 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 05 May 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qt
Qt qtdeclarative |
|
| CPEs | cpe:2.3:a:qt:qtdeclarative:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Qt
Qt qtdeclarative |
|
| Metrics |
cvssV3_1
|
Thu, 30 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insufficient validation of node IDs in Qt SVG module allows arbitrary QML/JavaScript code injection when loading malicious SVG files through the VectorImage component in Qt Quick. While QML execution is typically more restricted than native code execution, this could still lead to denial of service, information disclosure, or other impacts depending on the application's privilege level and data access. | |
| Title | Possible QML code injection in VectorImage component | |
| First Time appeared |
The Qt Company
The Qt Company qt |
|
| Weaknesses | CWE-20 CWE-94 |
|
| CPEs | cpe:2.3:a:the_qt_company:qt:*:*:32_bit:*:*:*:*:* cpe:2.3:a:the_qt_company:qt:*:*:64_bit:*:*:*:*:* cpe:2.3:a:the_qt_company:qt:*:*:android:*:*:*:*:* cpe:2.3:a:the_qt_company:qt:*:*:arm:*:*:*:*:* cpe:2.3:a:the_qt_company:qt:*:*:ios:*:*:*:*:* cpe:2.3:a:the_qt_company:qt:*:*:linux:*:*:*:*:* cpe:2.3:a:the_qt_company:qt:*:*:macos:*:*:*:*:* cpe:2.3:a:the_qt_company:qt:*:*:windows:*:*:*:*:* cpe:2.3:a:the_qt_company:qt:*:*:x86:*:*:*:*:* |
|
| Vendors & Products |
The Qt Company
The Qt Company qt |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TQtC
Published:
Updated: 2026-04-30T13:14:04.728Z
Reserved: 2025-12-12T12:52:21.516Z
Link: CVE-2025-14576
Updated: 2026-04-30T13:13:59.958Z
Status : Analyzed
Published: 2026-04-30T13:16:02.850
Modified: 2026-05-05T02:57:05.760
Link: CVE-2025-14576
OpenCVE Enrichment
Updated: 2026-05-02T00:30:16Z