CVE-2025-14576 PUBLISHED

Possible QML code injection in VectorImage component

Assigner: TQtC
Reserved: 12.12.2025 Published: 30.04.2026 Updated: 30.04.2026

Insufficient validation of node IDs in Qt SVG module allows arbitrary QML/JavaScript code injection when loading malicious SVG files through the VectorImage component in Qt Quick. While QML execution is typically more restricted than native code execution, this could still lead to denial of service, information disclosure, or other impacts depending on the application's privilege level and data access.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U
CVSS Score: 7.4

Product Status

Vendor The Qt Company
Product Qt
Versions Default: unaffected
  • affected from 6.8.0 to 6.8.6 (incl.)
  • affected from 6.10.0 to 6.10.1 (incl.)

Solutions

Update to Qt 6.8.7 or Qt 6.10.2 or later. As a temporary mitigation, validate and sanitize all SVG files before loading them with VectorImage, or only load SVG files from trusted sources.

Credits

  • Qt Development Team finder

References

Problem Types

  • CWE-94 Improper Control of Generation of Code ('Code Injection') CWE
  • CWE-20 Improper Input Validation CWE

Impacts

  • CAPEC-242 Code Injection