Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70560: n/a

0
High
VulnerabilityCVE-2025-70560cvecve-2025-70560
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Boltz 2.0.0 contains an insecure deserialization vulnerability in its molecule loading functionality. The application uses Python pickle to deserialize molecule data files without validation. An attacker with the ability to place a malicious pickle file in a directory processed by boltz can achieve arbitrary code execution when the file is loaded.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:15:20 UTC

Technical Analysis

CVE-2025-70560 identifies a critical insecure deserialization vulnerability in Boltz 2.0.0, a software application used for molecule data processing. The vulnerability arises because Boltz uses Python's pickle module to deserialize molecule data files without any validation or sanitization of the input. Python pickle is known to be unsafe when deserializing untrusted data, as it can execute arbitrary code embedded within the serialized object. An attacker who can place a maliciously crafted pickle file in a directory that Boltz processes can cause the application to execute arbitrary code with the privileges of the running process. This could lead to full system compromise, data theft, or further lateral movement within a network. The vulnerability requires the attacker to have the ability to write files to the target directory, which might be possible through other vulnerabilities, misconfigurations, or insider threats. No authentication or user interaction is required once the malicious file is in place, making the attack vector straightforward if file placement is achievable. There are no known public exploits or patches available at the time of publication, and no CVSS score has been assigned. The lack of patching and the critical nature of the vulnerability necessitate immediate attention from users of Boltz 2.0.0. The vulnerability is particularly concerning for environments where Boltz is used in scientific research, chemical modeling, or pharmaceutical development, as these sectors often handle sensitive intellectual property and data.

Potential Impact

For European organizations, the impact of CVE-2025-70560 can be severe. Successful exploitation allows arbitrary code execution, potentially leading to full system compromise, data exfiltration, or disruption of critical scientific workflows. Organizations in pharmaceutical, chemical, and research sectors that rely on Boltz 2.0.0 for molecule data processing are at high risk. The compromise of such systems could result in intellectual property theft, loss of research data integrity, and operational downtime. Additionally, if Boltz is integrated into larger computational pipelines or connected to sensitive networks, the attacker could pivot to other systems, amplifying the impact. Given the strategic importance of chemical and pharmaceutical industries in Europe, exploitation could have broader economic and national security implications. The vulnerability also poses risks to academic institutions and research centers that use Boltz for molecular simulations. The absence of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation once a malicious file is placed underscores the urgency of addressing this issue.

Mitigation Recommendations

To mitigate CVE-2025-70560, European organizations should implement the following specific measures: 1) Immediately restrict write permissions on directories where Boltz loads molecule data to trusted users and processes only. 2) Replace the use of Python pickle for deserialization with safer alternatives such as JSON or XML parsers that do not allow code execution. 3) If code changes are possible, implement strict validation and sanitization of all input files before deserialization. 4) Monitor file system activity for unauthorized file creation or modification in Boltz data directories. 5) Employ application whitelisting and endpoint detection and response (EDR) tools to detect anomalous code execution patterns. 6) Isolate Boltz processing environments from critical network segments to limit lateral movement. 7) Engage with the Boltz software vendor or community to obtain patches or updates that address this vulnerability. 8) Conduct security awareness training for staff with access to Boltz environments to recognize and report suspicious activity. These targeted actions go beyond generic advice and focus on the specific attack vector and environment of Boltz 2.0.0.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd6f9fa50a62f766379

Added to database: 2/4/2026, 8:01:26 AM

Last enriched: 2/4/2026, 8:15:20 AM

Last updated: 2/5/2026, 5:40:29 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats