Description
Insufficient validation of node IDs in Qt SVG module allows arbitrary QML/JavaScript code injection when loading malicious SVG files through the VectorImage component in Qt Quick. While QML execution is typically more restricted than native code execution, this could still lead to denial of service, information disclosure, or other impacts depending on the application's privilege level and data access.
Published: 2026-04-30
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Insufficient validation of node identifiers in the Qt SVG module allows an attacker to embed and execute arbitrary QML or JavaScript code when a malicious SVG file is loaded with the VectorImage component. Although execution is limited to the QML environment, it can still lead to denial of service, information disclosure, or other impacts depending on the privileges of the running application.

Affected Systems

The vulnerability affects applications built with Qt 6, specifically the Qt Quick and Qt SVG modules across all supported platforms (32‑bit, 64‑bit, Android, ARM, iOS, Linux, macOS, Windows, and x86). Versions prior to Qt 6.8.7 or Qt 6.10.2 are vulnerable; the security fix is available in Qt 6.8.7, Qt 6.10.2, and later releases.

Risk and Exploitability

The CVSS score of 7.4 indicates a high severity. EPSS is not available, so the probability of exploitation at this time is unknown, and the vulnerability is not listed in the CISA KEV catalog. Because the raw SVG file can be supplied by an untrusted source or remote server, it is reasonable to infer a network-facing attack vector. Exploitation requires delivering a crafted SVG file that references a node ID triggering QML code execution; the impact is limited to the application’s context but can still be significant.

Generated by OpenCVE AI on May 2, 2026 at 00:20 UTC.

Remediation

Vendor Solution

Update to Qt 6.8.7 or Qt 6.10.2 or later. As a temporary mitigation, validate and sanitize all SVG files before loading them with VectorImage, or only load SVG files from trusted sources.


OpenCVE Recommended Actions

  • Upgrade Qt to version 6.8.7, 6.10.2, or later to apply the vendor patch.
  • Validate and sanitize SVG files before loading them with VectorImage to ensure node identifiers do not contain executable QML or JavaScript.
  • Restrict the use of VectorImage to SVG files from trusted sources or disable its use for untrusted content.

Generated by OpenCVE AI on May 2, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
Description Insufficient validation of node IDs in Qt SVG module allows arbitrary QML/JavaScript code injection when loading malicious SVG files through the VectorImage component in Qt Quick. While QML execution is typically more restricted than native code execution, this could still lead to denial of service, information disclosure, or other impacts depending on the application's privilege level and data access.
Title Possible QML code injection in VectorImage component
First Time appeared The Qt Company
The Qt Company qt
Weaknesses CWE-20
CWE-94
CPEs cpe:2.3:a:the_qt_company:qt:*:*:32_bit:*:*:*:*:*
cpe:2.3:a:the_qt_company:qt:*:*:64_bit:*:*:*:*:*
cpe:2.3:a:the_qt_company:qt:*:*:android:*:*:*:*:*
cpe:2.3:a:the_qt_company:qt:*:*:arm:*:*:*:*:*
cpe:2.3:a:the_qt_company:qt:*:*:ios:*:*:*:*:*
cpe:2.3:a:the_qt_company:qt:*:*:linux:*:*:*:*:*
cpe:2.3:a:the_qt_company:qt:*:*:macos:*:*:*:*:*
cpe:2.3:a:the_qt_company:qt:*:*:windows:*:*:*:*:*
cpe:2.3:a:the_qt_company:qt:*:*:x86:*:*:*:*:*
Vendors & Products The Qt Company
The Qt Company qt
References
Metrics cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U'}


Subscriptions

The Qt Company Qt
cve-icon MITRE

Status: PUBLISHED

Assigner: TQtC

Published:

Updated: 2026-04-30T13:14:04.728Z

Reserved: 2025-12-12T12:52:21.516Z

Link: CVE-2025-14576

cve-icon Vulnrichment

Updated: 2026-04-30T13:13:59.958Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-30T13:16:02.850

Modified: 2026-04-30T15:48:26.580

Link: CVE-2025-14576

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:30:16Z

Weaknesses