Use After Free Vulnerability in Open Babel Software
CVE-2025-10994
Key Information:
- Vendor
Open Babel
- Status
- Vendor
- CVE Published:
- 26 September 2025
Badges
What is CVE-2025-10994?
A vulnerability has been detected in Open Babel affecting versions up to 3.1.1. The issue resides in the GAMESSOutputFormat::ReadMolecule method within gamessformat.cpp, where improper handling of memory can lead to a use after free condition. This flaw can potentially allow an attacker to execute arbitrary code by manipulating memory, making the system susceptible to exploitation from a local host. The public availability of the exploit further heightens the concern for users of this software.
Affected Version(s)
Open Babel 3.1.0
Open Babel 3.1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved