Heap-based Buffer Overflow in Open Babel Product by Open Babel Vendor
CVE-2025-10997

4.8MEDIUM

Key Information:

Vendor

Open Babel

Vendor
CVE Published:
26 September 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-10997?

A security flaw exists in Open Babel prior to version 3.1.1, specifically in the ChemKinFormat::CheckSpecies function located in the chemkinformat.cpp file. This vulnerability can be exploited locally to achieve a heap-based buffer overflow, allowing for potential manipulation of memory space during execution. Although the attack vector requires local access, it poses a risk if exploited. Developers are urged to update to the latest secured version to mitigate the risks associated with this vulnerability.

Affected Version(s)

Open Babel 3.1.0

Open Babel 3.1.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ahuo (VulDB User)
.
CVE-2025-10997 : Heap-based Buffer Overflow in Open Babel Product by Open Babel Vendor