{"id":"CVE-2020-24742","details":"An issue has been fixed in Qt versions 5.14.0 where QPluginLoader attempts to load plugins relative to the working directory, allowing attackers to execute arbitrary code via crafted files.","modified":"2026-04-10T04:25:00.387274Z","published":"2021-08-09T22:15:08.607Z","references":[{"type":"FIX","url":"https://codereview.qt-project.org/c/qt/qtbase/+/280730"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qt/qtbase","events":[{"introduced":"d0cdc7ad1e2728caf363abf328b2ad81f2ed5a5b"},{"fixed":"1bf5d3af1a4ec307bb77e1b54bb1f723c3eef481"},{"introduced":"fc9ae22c88dd085c7c31599037132fc756feeb04"},{"last_affected":"a7a24784eeba6747d319eb911583bdd99ef38cdb"}],"database_specific":{"versions":[{"introduced":"5.6.0"},{"fixed":"5.12.7"},{"introduced":"5.13.0"},{"last_affected":"5.13.2"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-24742.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}