Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 20 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 16 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 16 May 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Link Resolution Before File Access ('Link Following') vulnerability in QFileSystemEngine in the Qt corelib module on Windows which potentially allows Symlink Attacks and the use of Malicious Files. Issue originates from CVE-2024-38081. The vulnerability arises from the use of the GetTempPath API, which can be exploited by attackers to manipulate temporary file paths, potentially leading to unauthorized access and privilege escalation. The affected public API in the Qt Framework is QDir::tempPath() and anything that uses it, such as QStandardPaths with TempLocation, QTemporaryDir, and QTemporaryFile.This issue affects all version of Qt up to and including 5.15.18, from 6.0.0 through 6.5.8, from 6.6.0 through 6.8.1. It is fixed in Qt 5.15.19, Qt 6.5.9, Qt 6.8.2, 6.9.0 | |
Title | Improper Link Resolution Before File Access in QFileSystemEngine on Windows | |
Weaknesses | CWE-59 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: TQtC
Published:
Updated: 2025-05-16T13:54:00.528Z
Reserved: 2025-05-02T10:56:13.857Z
Link: CVE-2025-4211

Updated: 2025-05-16T13:53:57.348Z

Status : Awaiting Analysis
Published: 2025-05-16T14:15:32.233
Modified: 2025-05-16T14:42:18.700
Link: CVE-2025-4211


No data.