CVE-2025-10729
CBL Mariner vulnerability analysis and mitigation

Overview

The Qt SVG module contains a critical use-after-free vulnerability (CVE-2025-10729) that affects Qt versions 6.7.0 through 6.8.4, and 6.9.0 through 6.9.2. The vulnerability occurs when the module parses a node that is not a child of a structural node in an SVG file, where the node gets deleted after creation but might be accessed later, leading to a use-after-free condition. This vulnerability has been assigned a CVSS 4.0 base score of 9.4, indicating critical severity (Security Online, NVD).

Technical details

The vulnerability is classified as CWE-416 (Use After Free) and occurs in the SVG parsing functionality of the Qt framework. When processing SVG files, the module incorrectly handles nodes that are not children of structural nodes, leading to a memory management issue where deleted nodes might be accessed after their deletion. The vulnerability carries a Critical CVSS 4.0 score of 9.4 with the following vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/RE:H/U:Red (NVD).

Impact

The vulnerability poses significant risks as it could potentially lead to remote code execution (RCE) depending on how memory is reallocated. This is particularly concerning in environments where SVG rendering is exposed to untrusted input, such as web engines, UI design tools, or document viewers. The Qt SVG module's widespread use across software ecosystems, including desktop environments like KDE Plasma, automotive systems, medical devices, and IoT systems, significantly broadens the potential attack surface (Security Online).

Mitigation and workarounds

Qt has released patches to address this vulnerability. Users and developers are strongly advised to upgrade to Qt 6.9.3 or 6.8.5. Until systems can be fully patched, it is recommended to avoid rendering untrusted SVG content and to review third-party dependencies for the presence of the vulnerable module (Security Online).

Additional resources


SourceThis report was generated using AI

Related CBL Mariner vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-10729CRITICAL9.4
  • CBL MarinerCBL Mariner
  • qtsvg
NoYesOct 03, 2025
CVE-2025-9900HIGH8.8
  • Rocky LinuxRocky Linux
  • libtiff-tools-debuginfo
NoYesSep 23, 2025
CVE-2025-9648HIGH8.7
  • CBL MarinerCBL Mariner
  • civetweb
NoYesSep 29, 2025
CVE-2025-9230HIGH7.5
  • LibreSSLLibreSSL
  • openssl11-debuginfo
NoYesSep 30, 2025
CVE-2025-10823MEDIUM4.8
  • CBL MarinerCBL Mariner
  • fio
NoYesSep 23, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management