CVE-2025-4211
Improper Link Resolution Before File Access in QFileSystemEngine on Windows
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Improper Link Resolution Before File Access ('Link Following') vulnerability in QFileSystemEngine in the Qt corelib module on Windows which potentially allows Symlink Attacks and the use of Malicious Files. Issue originates from CVE-2024-38081. The vulnerability arises from the use of the GetTempPath API, which can be exploited by attackers to manipulate temporary file paths, potentially leading to unauthorized access and privilege escalation. The affected public API in the Qt Framework is QDir::tempPath() and anything that uses it, such as QStandardPaths with TempLocation, QTemporaryDir, and QTemporaryFile.This issue affects all version of Qt up to and including 5.15.18, from 6.0.0 through 6.5.8, from 6.6.0 through 6.8.1. It is fixed in Qt 5.15.19, Qt 6.5.9, Qt 6.8.2, 6.9.0
Improper Link Resolution Before File Access ('Link Following') vulnerability in QFileSystemEngine in the Qt corelib module on Windows which potentially allows Symlink Attacks and the use of Malicious Files. Issue originates from CVE-2024-38081. The vulnerability arises from the use of the GetTempPath API, which can be exploited by attackers to manipulate temporary file paths, potentially leading to unauthorized access and privilege escalation. The affected public API in the Qt Framework is QDir::tempPath() and anything that uses it, such as QStandardPaths with TempLocation, QTemporaryDir, and QTemporaryFile.This issue affects all version of Qt up to and including 5.15.18, from 6.0.0 through 6.5.8, from 6.6.0 through 6.8.1. It is fixed in Qt 5.15.19, Qt 6.5.9, Qt 6.8.2, 6.9.0
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2025-05-02 CVE Reserved
- 2025-05-16 CVE Published
- 2025-05-16 CVE Updated
- 2025-05-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
- CAPEC-17: Using Malicious Files
- CAPEC-132: Symlink Attack
References (1)
URL | Tag | Source |
---|---|---|
https://codereview.qt-project.org/c/qt/qtbase/+/632231 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
The Qt Company Search vendor "The Qt Company" | Qt Search vendor "The Qt Company" for product "Qt" | <= 5.15.18 Search vendor "The Qt Company" for product "Qt" and version " <= 5.15.18" | en |
Affected
| ||||||
The Qt Company Search vendor "The Qt Company" | Qt Search vendor "The Qt Company" for product "Qt" | >= 6.0.0 <= 6.5.8 Search vendor "The Qt Company" for product "Qt" and version " >= 6.0.0 <= 6.5.8" | en |
Affected
| ||||||
The Qt Company Search vendor "The Qt Company" | Qt Search vendor "The Qt Company" for product "Qt" | >= 6.6.0 <= 6.8.1 Search vendor "The Qt Company" for product "Qt" and version " >= 6.6.0 <= 6.8.1" | en |
Affected
|