Boltz contains an insecure deserialization vulnerability in its molecule loading functionality
High severity
GitHub Reviewed
Published
Feb 3, 2026
to the GitHub Advisory Database
•
Updated Feb 4, 2026
Description
Published by the National Vulnerability Database
Feb 3, 2026
Published to the GitHub Advisory Database
Feb 3, 2026
Reviewed
Feb 4, 2026
Last updated
Feb 4, 2026
Boltz 2.0.0 contains an insecure deserialization vulnerability in its molecule loading functionality. The application uses Python pickle to deserialize molecule data files without validation. An attacker with the ability to place a malicious pickle file in a directory processed by boltz can achieve arbitrary code execution when the file is loaded.
References