CVE-2025-14575
Awaiting Analysis Awaiting Analysis - Queue
Uncontrolled Search Path Element in Qt Framework

Publication date: 2026-05-19

Last updated on: 2026-05-19

Assigner: TQtC

Description
An Uncontrolled Search Path Element vulnerability in the OpenSSL TLS backend of Qt Network (qtbase) in Qt Qt Framework (Unix) allows a local attacker to load a rogue CA certificate as a trusted system authority via a crafted certificate file placed in the application's working directory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-19
Last Modified
2026-05-19
Generated
2026-05-20
AI Q&A
2026-05-19
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
qt qt_framework *
qt qtbase *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Uncontrolled Search Path Element issue in the OpenSSL TLS backend of the Qt Network module (qtbase) within the Qt Framework on Unix systems. It allows a local attacker to place a specially crafted certificate file in the application's working directory. As a result, the application may load a rogue Certificate Authority (CA) certificate as if it were a trusted system authority.


How can this vulnerability impact me? :

The vulnerability can lead to a local attacker being able to trick the application into trusting a malicious CA certificate. This could allow the attacker to intercept or manipulate TLS communications that rely on the Qt Network module, potentially compromising the confidentiality and integrity of data transmitted over secure connections.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart