The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-6210

CVE-2026-6210: Qt SVG Type Confusion DoS Vulnerability

CVE-2026-6210 is a type confusion vulnerability in Qt SVG that causes application crashes through crafted SVG images. This post covers the technical details, affected versions, impact, and mitigation strategies.

Published: May 7, 2026

CVE-2026-6210 Overview

CVE-2026-6210 is a type confusion vulnerability [CWE-122] in the Qt SVG module. The flaw lets a remote attacker crash any application that renders attacker-controlled Scalable Vector Graphics (SVG) content. Exploitation requires no authentication and no user interaction beyond opening or rendering the malicious image.

The Qt SVG renderer resolves marker references by node id and casts the result to QSvgMarker* without validating the node type. A non-marker element such as <line> that references itself as a marker triggers an out-of-bounds heap read followed by unbounded recursion, crashing the process.

Critical Impact

Remote, unauthenticated attackers can crash any Qt-based application that processes untrusted SVG input, producing a denial of service condition across desktop, embedded, and mobile Qt deployments.

Affected Products

  • Qt SVG versions 6.7.0 through 6.8.7
  • Qt SVG versions 6.9.0 through 6.11.0
  • Any application or framework that links against a vulnerable Qt SVG library and renders untrusted SVG content

Discovery Timeline

  • 2026-05-06 - CVE-2026-6210 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-6210

Vulnerability Analysis

The vulnerability resides in the Qt SVG marker resolution path. When the renderer encounters a marker-start, marker-mid, or marker-end reference, it looks up the target node by its id attribute. The lookup returns a generic SVG node pointer, which the code then casts directly to QSvgMarker* without performing a runtime type check.

When an attacker crafts an SVG where a non-marker element references itself as its own marker, two distinct memory safety failures occur. First, the cast treats a smaller QSvgLine (or similar) object as the larger QSvgMarker object, producing a heap-based out-of-bounds read [CWE-122] across the trailing fields. Second, the marker recursion guard relies on virtual dispatch that is rerouted through the wrong vtable, defeating the cycle protection and causing unbounded recursive calls. The combination terminates the process through stack exhaustion or invalid memory access.

Root Cause

The root cause is missing type verification before downcasting. The renderer assumes that any node referenced as a marker is a QSvgMarker, with no dynamic_cast or explicit type tag check. A self-referential marker bypasses the recursion guard because the guard is implemented on QSvgMarker semantics that the confused object does not honor.

Attack Vector

An attacker delivers a crafted SVG file through any channel the target application accepts: a web page, an email attachment, a chat message, a file preview, or a network-loaded resource. When Qt SVG parses and renders the file, the type confusion fires immediately. No privileges and no user interaction beyond rendering are required.

The vulnerability impacts confidentiality only minimally because the out-of-bounds read result is consumed internally before the crash. The primary outcome is denial of service of the rendering process. See the Qt Project Code Review and OSS-Fuzz Issue Report for the upstream fix and reproducer.

Detection Methods for CVE-2026-6210

Indicators of Compromise

  • SVG files containing a <line>, <path>, <rect>, or other non-marker element with marker-start, marker-mid, or marker-end attributes pointing to the element's own id
  • Repeated unexpected crashes of Qt-based applications immediately after opening or previewing SVG content
  • Crash dumps showing recursive frames inside Qt SVG marker rendering routines or access violations referencing QSvgMarker virtual calls

Detection Strategies

  • Inspect inbound SVG attachments and downloads for self-referential marker-* attributes and cyclic id references using a content-aware proxy or mail gateway
  • Enable application crash reporting and aggregate crashes by faulting module to surface anomalous Qt SVG failure clusters
  • Inventory installed Qt versions across endpoints and servers, flagging any QtSvg library in the affected version ranges

Monitoring Recommendations

  • Monitor Windows Error Reporting, macOS ReportCrash, and Linux coredumpctl output for repeated faults inside libQt6Svg or Qt5Svg
  • Alert on processes that load Qt SVG libraries and terminate abnormally within seconds of receiving network or file input
  • Track SVG rendering activity in browsers, document viewers, and chat clients that embed Qt for sudden spikes in crash telemetry

How to Mitigate CVE-2026-6210

Immediate Actions Required

  • Upgrade Qt SVG to version 6.8.8 or later on the 6.8 branch, or 6.11.1 or later on the 6.11 branch
  • Identify all internally developed and third-party applications that bundle Qt SVG and rebuild or repackage them against the patched library
  • Restrict SVG rendering in high-risk applications until patches are deployed, especially for content sourced from untrusted networks or users

Patch Information

The Qt project addressed the issue by adding proper type verification before the QSvgMarker cast and hardening the marker recursion guard. The upstream fix is documented in the Qt Project Code Review. Distributions and downstream Qt-based products should pull the fix from the 6.8.8 and 6.11.1 release tags.

Workarounds

  • Disable or strip SVG rendering in applications that do not require it, falling back to raster image formats for untrusted content
  • Sanitize inbound SVG by removing marker-start, marker-mid, and marker-end attributes, or by rejecting SVGs whose marker references resolve to non-<marker> elements
  • Sandbox the rendering process so that a crash is contained and cannot impact host stability or other workloads
bash
# Configuration example: verify installed Qt SVG version on Linux
dpkg -l | grep -Ei 'libqt[56]svg'
rpm -qa | grep -Ei 'qt[56]-qtsvg'

# Strip vulnerable marker attributes from SVGs before rendering
sed -i -E 's/ marker-(start|mid|end)="[^"]*"//g' untrusted.svg

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechQt

  • SeverityHIGH

  • CVSS Score8.7

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-122
  • Technical References
  • Qt Project Code Review

  • OSS-Fuzz Issue Report
  • Related CVEs
  • CVE-2025-12385: Qt Quick Text Component DoS Vulnerability

  • CVE-2025-6338: Qt Network Schannel DoS Vulnerability

  • CVE-2025-5455: Qt Framework DoS Vulnerability

  • CVE-2023-43114: Qt Framework DOS Vulnerability on Windows
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English