Heap-based Buffer Overflow in Open Babel Product by Open Babel Vendor
CVE-2025-10997
Key Information:
- Vendor
Open Babel
- Status
- Vendor
- CVE Published:
- 26 September 2025
Badges
What is CVE-2025-10997?
A security flaw exists in Open Babel prior to version 3.1.1, specifically in the ChemKinFormat::CheckSpecies function located in the chemkinformat.cpp file. This vulnerability can be exploited locally to achieve a heap-based buffer overflow, allowing for potential manipulation of memory space during execution. Although the attack vector requires local access, it poses a risk if exploited. Developers are urged to update to the latest secured version to mitigate the risks associated with this vulnerability.
Affected Version(s)
Open Babel 3.1.0
Open Babel 3.1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved