Description
An Uncontrolled Search Path Element vulnerability in the OpenSSL TLS backend of Qt Network (qtbase) in Qt Qt Framework (Unix) allows a local attacker to load a rogue CA certificate as a trusted system authority via a crafted certificate file placed in the application's working directory.
Published: 2026-05-19
Score: 1.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The OpenSSL TLS backend in Qt Network (qtbase) contains an uncontrolled search path element that permits a local attacker to load a crafted CA certificate from the application's working directory as a trusted system authority. By creating a certificate file in a directory that Qt scans during TLS initialization, the attacker can elevate the certificate to an accepted root CA, enabling subsequent TLS session interception or decryption for Qt applications that rely on that backend. This flaw is a classic example of CWE‑427 and allows local privilege escalation in the context of the running application.

Affected Systems

The Qt Company products include the Qt Framework, specifically the Qt Network component that uses an OpenSSL TLS backend on Unix‑like operating systems. No specific version information is provided, so any installation that incorporates the default qtbase OpenSSL TLS backend may be vulnerable.

Risk and Exploitability

The CVSS score of 1.8 reflects the low magnitude of impact when the flaw is only exploitable locally. Because the attacker must place a certificate file in the application's working copy, exploitation requires local access or control over the application environment. With no EPSS score reported and absence from CISA KEV, this vulnerability is not currently known to be actively exploited in the wild. Nonetheless, the flaw provides a foothold for persistent man‑in‑the‑middle attacks against Qt applications that trust the OpenSSL backend.

Generated by OpenCVE AI on May 19, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Qt framework to a version that resolves the uncontrolled search path element in qtbase’s OpenSSL TLS backend.
  • Before launching applications, delete any aftermarket certificate files from the application's working directories and verify that only legitimate certificates remain.
  • Reconfigure Qt applications or the system’s OpenSSL settings to use a fixed, explicitly specified CA bundle path and prevent automatic loading of certificates from the working directory.

Generated by OpenCVE AI on May 19, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared The Qt Company
The Qt Company qt
Vendors & Products The Qt Company
The Qt Company qt

Tue, 19 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description An Uncontrolled Search Path Element vulnerability in the OpenSSL TLS backend of Qt Network (qtbase) in Qt Qt Framework (Unix) allows a local attacker to load a rogue CA certificate as a trusted system authority via a crafted certificate file placed in the application's working directory.
Title Uncontrolled Search Path Element in Qt Network OpenSSL TLS backend allows rogue CA certificate loading
Weaknesses CWE-427
References
Metrics cvssV4_0

{'score': 1.8, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

The Qt Company Qt
cve-icon MITRE

Status: PUBLISHED

Assigner: TQtC

Published:

Updated: 2026-05-19T14:11:40.774Z

Reserved: 2025-12-12T12:52:17.628Z

Link: CVE-2025-14575

cve-icon Vulnrichment

Updated: 2026-05-19T14:11:36.237Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T14:16:27.120

Modified: 2026-05-19T14:46:56.260

Link: CVE-2025-14575

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T14:45:07Z

Weaknesses