Qt up to 5.15.18/6.5.8/6.7.x QDom encodeText algorithmic complexity
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.4 | $0-$5k | 0.00 |
Summary
A vulnerability labeled as problematic has been found in Qt up to 5.15.18/6.5.8/6.7.x. Affected by this issue is the function encodeText of the component QDom. The manipulation results in algorithmic complexity.
This vulnerability is identified as CVE-2025-30348. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
Details
A vulnerability, which was classified as problematic, was found in Qt up to 5.15.18/6.5.8/6.7.x. Affected is the function encodeText of the component QDom. The manipulation with an unknown input leads to a algorithmic complexity vulnerability. CWE is classifying the issue as CWE-407. An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached. This is going to have an impact on availability. CVE summarizes:
encodeText in QDom in Qt before 6.8.0 has a complex algorithm involving XML string copy and inline replacement of parts of a string (with relocation of later data).
The advisory is shared for download at codereview.qt-project.org. This vulnerability is traded as CVE-2025-30348 since 03/21/2025. The exploitability is told to be easy. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1499.
The vulnerability scanner Nessus provides a plugin with the ID 241932 (Azure Linux 3.0 Security Update: qt5-qtbase / qtbase (CVE-2025-30348)), which helps to determine the existence of the flaw in a target environment.
Upgrading to version 5.15.19, 6.5.9 or 6.8.0 eliminates this vulnerability.
The vulnerability is also documented in the databases at Tenable (241932) and EUVD (EUVD-2025-7261). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Name
Version
- 5.15.0
- 5.15.1
- 5.15.2
- 5.15.3
- 5.15.4
- 5.15.5
- 5.15.6
- 5.15.7
- 5.15.8
- 5.15.9
- 5.15.10
- 5.15.11
- 5.15.12
- 5.15.13
- 5.15.14
- 5.15.15
- 5.15.16
- 5.15.17
- 5.15.18
- 6.0
- 6.1
- 6.2
- 6.3
- 6.4
- 6.5
- 6.5.0
- 6.5.1
- 6.5.2
- 6.5.3
- 6.5.4
- 6.5.5
- 6.5.6
- 6.5.7
- 6.5.8
- 6.6
- 6.7
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.4
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 5.8
CNA Vector (MITRE): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Algorithmic complexityCWE: CWE-407 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 241932
Nessus Name: Azure Linux 3.0 Security Update: qt5-qtbase / qtbase (CVE-2025-30348)
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Qt 5.15.19/6.5.9/6.8.0
Timeline
03/21/2025 🔍03/21/2025 🔍
03/21/2025 🔍
07/11/2025 🔍
Sources
Advisory: codereview.qt-project.orgStatus: Confirmed
CVE: CVE-2025-30348 (🔍)
GCVE (CVE): GCVE-0-2025-30348
GCVE (VulDB): GCVE-100-300576
EUVD: 🔍
Entry
Created: 03/21/2025 08:18Updated: 07/11/2025 15:44
Changes: 03/21/2025 08:18 (64), 06/07/2025 20:41 (1), 07/11/2025 15:44 (2)
Complete: 🔍
Cache ID: 216:994:103
No comments yet. Languages: en.
Please log in to comment.