CVE-2026-6210
Type confusion and heap-buffer-overflow in Qt SVG marker handling causing application crash
A type confusion vulnerability in Qt SVG allows an attacker to cause an application crash via a crafted SVG image. When processing SVG marker references, the renderer retrieves a node by its id attribute and casts it to QSvgMarker* without verifying the node type. A non-marker element (such as a <line> element) that references itself as a marker triggers an out-of-bounds heap read due to the object size difference between QSvgLine and QSvgMarker, followed by an endless recursion that bypasses the marker recursion guard through incorrect virtual dispatch. The result is an application crash (denial of service). This issue affects Qt SVG:ย from 6.7.0 before 6.8.8, from 6.9.0 before 6.11.1.
| CWE | CWE-843 CWE-122 |
| Vendor | the qt company |
| Product | qt |
| Published | May 6, 2026 |
| Last Updated | May 6, 2026 |
Get instant alerts for the qt company qt
Be the first to know when new unknown vulnerabilities affecting the qt company qt are published โ delivered to Slack, Telegram or Discord.