CVE-2025-10994

Source
https://cve.org/CVERecord?id=CVE-2025-10994
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-10994.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-10994
Downstream
Published
2025-09-26T02:15:52.100Z
Modified
2026-04-10T05:21:23.294421Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A weakness has been identified in Open Babel up to 3.1.1. This affects the function GAMESSOutputFormat::ReadMolecule of the file gamessformat.cpp. This manipulation causes use after free. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be exploited.

References

Affected packages

Git / github.com/openbabel/openbabel

Affected ranges

Type
GIT
Repo
https://github.com/openbabel/openbabel
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "3.1.1"
        }
    ]
}

Affected versions

Other
openbabel-3-0-0
openbabel-3-0-0a1
openbabel-3-0-0a2
openbabel-3-1-0
openbabel-3-1-1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-10994.json"