CVE-2025-1793

| EUVD-2025-16964 CRITICAL
9.8
CVSS 3.0
Share

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 14, 2026 - 17:53 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:53 euvd
EUVD-2025-16964
Patch Released
Mar 14, 2026 - 17:53 nvd
Patch available
PoC Detected
Jul 30, 2025 - 21:29 vuln.today
Public exploit code
CVE Published
Jun 05, 2025 - 05:15 nvd
CRITICAL 9.8

Description

Multiple vector store integrations in run-llama/llama_index version v0.12.21 have SQL injection vulnerabilities. These vulnerabilities allow an attacker to read and write data using SQL, potentially leading to unauthorized access to data of other users depending on the usage of the llama-index library in a web application.

Analysis

Critical SQL injection vulnerability affecting run-llama/llama_index v0.12.21 and potentially other versions, present in multiple vector store integrations. Attackers can execute arbitrary SQL commands without authentication to read and write data, potentially compromising data belonging to other users in web applications leveraging this library. With a CVSS 9.8 severity score, network-accessible attack vector, and no authentication required, this vulnerability poses an immediate and severe risk to production deployments.

Technical Context

Llama_index is a Python library for building LLM applications with vector store integrations for semantic search and data management. The vulnerability exists in SQL-based vector store adapters (likely PostgreSQL, MySQL, SQLite, or similar database backends) where user-supplied input is improperly sanitized before being concatenated into SQL queries. This is a classic CWE-89 (SQL Injection) vulnerability where dynamic SQL construction fails to use parameterized queries or prepared statements. The library's vector store integration layer accepts inputs (potentially from LLM prompts, user queries, or API parameters) that are passed directly to database drivers without proper escaping or parameterization, allowing attackers to inject malicious SQL syntax. Affected CPE likely includes: cpe:2.3:a:run-llama:llama_index:0.12.21:*:*:*:*:python:*:*

Affected Products

run-llama/llama_index (['0.12.21'])

Priority Score

69
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +49
POC: +20

Vendor Status

Share

CVE-2025-1793 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy