Boltz 2.0.0 contains an insecure deserialization vulnerability in its molecule loading functionality. The application uses Python pickle to deserialize molecule data files without validation. An attacker with the ability to place a malicious pickle file in a directory processed by boltz can achieve arbitrary code execution when the file is loaded.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Tue, 03 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Boltz 2.0.0 contains an insecure deserialization vulnerability in its molecule loading functionality. The application uses Python pickle to deserialize molecule data files without validation. An attacker with the ability to place a malicious pickle file in a directory processed by boltz can achieve arbitrary code execution when the file is loaded. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-02-03T00:00:00.000Z
Updated: 2026-02-04T14:56:02.704Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70560
Updated: 2026-02-04T14:53:29.150Z
Status : Awaiting Analysis
Published: 2026-02-03T18:16:17.900
Modified: 2026-02-04T16:34:21.763
Link: CVE-2025-70560
No data.