A weakness has been identified in Open Babel up to 3.1.1. This affects the function GAMESSOutputFormat::ReadMolecule of the file gamessformat.cpp. This manipulation causes use after free. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be exploited.
References
| Link | Resource |
|---|---|
| https://github.com/openbabel/openbabel/issues/2834 | Exploit Issue Tracking |
| https://github.com/user-attachments/files/22318611/poc.zip | Exploit |
| https://vuldb.com/?ctiid.325922 | Permissions Required VDB Entry |
| https://vuldb.com/?id.325922 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.654057 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-09-26 02:15
Updated : 2025-09-29 13:07
NVD link : CVE-2025-10994
Mitre link : CVE-2025-10994
CVE.ORG link : CVE-2025-10994
JSON object : View
Products Affected
openbabel
- open_babel
