Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50636: n/a

0
Critical
VulnerabilityCVE-2024-50636cvecve-2024-50636
Published: Mon Nov 11 2024 (11/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:39:52 UTC

Technical Analysis

CVE-2024-50636 affects PyMOL version 2.5.0, a molecular visualization system widely used in scientific research. The vulnerability resides in the "Run Script" functionality, which processes .PYM files as Python scripts without adequate validation or sandboxing. This design flaw allows attackers to craft malicious .PYM files containing arbitrary Python code, including reverse shell payloads, which execute with the same privileges as the user running PyMOL. The root cause is improper input validation and the unsafe execution of untrusted script content, classified under CWE-94 (Improper Control of Generation of Code). The vulnerability is remotely exploitable without authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the ease of exploitation and the severe impact on confidentiality, integrity, and availability. No patches or official fixes are currently linked, and no exploits have been reported in the wild yet. This vulnerability poses a significant risk to environments where PyMOL is used to open or share .PYM files, potentially allowing attackers to execute arbitrary commands, steal sensitive data, or disrupt operations.

Potential Impact

The impact of CVE-2024-50636 is severe for organizations relying on PyMOL 2.5.0, particularly in academic, pharmaceutical, and biotech sectors where molecular visualization is critical. Successful exploitation can lead to full system compromise, including unauthorized data access, data manipulation, and disruption of scientific workflows. Attackers can establish persistent access via reverse shells, escalate privileges, and move laterally within networks. Since the vulnerability requires no authentication or user interaction, it can be exploited through malicious .PYM files delivered via email, file sharing, or compromised repositories. This can result in intellectual property theft, exposure of sensitive research data, and operational downtime. The broad impact on confidentiality, integrity, and availability underscores the critical nature of this vulnerability.

Mitigation Recommendations

To mitigate CVE-2024-50636, organizations should immediately implement the following measures: 1) Avoid opening .PYM files from untrusted or unknown sources to prevent execution of malicious code. 2) Restrict PyMOL usage to trusted environments and users with limited privileges to reduce potential damage. 3) Employ application whitelisting and endpoint detection to monitor and block suspicious Python script executions. 4) Use network segmentation to isolate systems running PyMOL from critical infrastructure. 5) Monitor logs for unusual process behavior or network connections indicative of reverse shell activity. 6) If possible, disable or restrict the "Run Script" functionality within PyMOL until a vendor patch is available. 7) Engage with the PyMOL development community or vendor for updates and patches addressing this vulnerability. 8) Educate users on the risks of opening unverified .PYM files and enforce strict file handling policies. These targeted actions go beyond generic advice and focus on reducing attack surface and early detection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b9cb7ef31ef0b5572ae

Added to database: 2/25/2026, 9:37:32 PM

Last enriched: 2/27/2026, 10:39:52 PM

Last updated: 4/12/2026, 7:54:25 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses