Description
A security vulnerability has been detected in Open Babel up to 3.1.1. The affected element is the function OpenBabel::transform3d::DescribeAsString of the file src/math/transform3d.cpp of the component CIF File Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The identifier of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is suggested to install a patch to address this issue. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-02-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Data Disclosure
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Open Babel library up to version 3.1.1, within the function OpenBabel::transform3d::DescribeAsString located in src/math/transform3d.cpp of the CIF File Handler component. A malformed CIF file can trigger an out‑of‑bounds read, allowing an attacker to read arbitrary memory contents. This can lead to disclosure of confidential information, corruption of output, or a crash that may be leveraged for denial‑of‑service. The weakness is a classic buffer overread (CWE‑125) affecting data that is not at the end of the buffer (CWE‑119).

Affected Systems

Affected products include Open Babel (pyopenbabel, etc.) for all releases up to and including 3.1.1. The issue is tied to the CIF File Handler component and occurs when parsing CIF files through the DescribeAsString routine. Any deployment of Open Babel 3.1.1 or older that accepts external CIF input is susceptible.

Risk and Exploitability

The calculated CVSS v3 score is 5.3, which represents moderate severity. The EPSS score is less than 1 %, indicating a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. However, the attack vector is remote, leveraging the ability to supply a crafted CIF file to the library; the public exploit has been disclosed, and the download of the malicious file is straightforward. While the potential impact is limited to confidentiality and availability rather than privilege escalation or code execution, the low probability of exploitation reduces overall risk for many environments. Prompt patching mitigates the risk entirely.

Generated by OpenCVE AI on April 16, 2026 at 17:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open Babel to version 3.1.2 or later, or apply the patch commit e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a to the source.
  • Reject or sanitize all external CIF files before feeding them to Open Babel, ensuring that the file size and format adhere to the official CIF specification.
  • If CIF import is not required for your workflow, disable or remove the CIF handling module from the Open Babel deployment to eliminate the attack surface.

Generated by OpenCVE AI on April 16, 2026 at 17:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 01 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Open Babel up to 3.1.1. The affected element is the function OpenBabel::transform3d::DescribeAsString of the file src/math/transform3d.cpp of the component CIF File Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. A security vulnerability has been detected in Open Babel up to 3.1.1. The affected element is the function OpenBabel::transform3d::DescribeAsString of the file src/math/transform3d.cpp of the component CIF File Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The identifier of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is suggested to install a patch to address this issue. The project was informed of the problem early through an issue report but has not responded yet.
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}


Tue, 24 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openbabel:open_babel:*:*:*:*:*:*:*:*

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Openbabel
Openbabel open Babel
Vendors & Products Openbabel
Openbabel open Babel

Thu, 19 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Open Babel up to 3.1.1. The affected element is the function OpenBabel::transform3d::DescribeAsString of the file src/math/transform3d.cpp of the component CIF File Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Open Babel CIF File transform3d.cpp DescribeAsString out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Openbabel Open Babel
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-03T17:21:41.044Z

Reserved: 2026-02-18T18:04:10.710Z

Link: CVE-2026-2704

cve-icon Vulnrichment

Updated: 2026-02-24T01:39:12.756Z

cve-icon NVD

Status : Modified

Published: 2026-02-19T07:17:49.720

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:15:17Z

Weaknesses