An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code. If the function was called with malformed data, for example, an URL that contained a "charset" parameter that lacked a value (such as "data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service (abort). This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.
History

Fri, 06 Jun 2025 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-617

Tue, 03 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Moderate


Mon, 02 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Jun 2025 09:00:00 +0000

Type Values Removed Values Added
Description An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code. If the function was called with malformed data, for example, an URL that contained a "charset" parameter that lacked a value (such as "data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service (abort). This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.
Title Possible denial of service when passing malformed data in a URL to qDecodeDataUrl
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H/R:U/RE:M/U:Clear'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TQtC

Published: 2025-06-02T08:46:20.524Z

Updated: 2025-06-02T12:42:34.203Z

Reserved: 2025-06-02T08:31:36.081Z

Link: CVE-2025-5455

cve-icon Vulnrichment

Updated: 2025-06-02T12:42:02.535Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-02T09:15:21.493

Modified: 2025-06-02T17:32:17.397

Link: CVE-2025-5455

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-06-02T08:46:20Z

Links: CVE-2025-5455 - Bugzilla