Llamaindex

19 CVEs product

Monthly

CVE-2024-58339 HIGH POC This Week

LlamaIndex (run-llama/llama_index) versions up to and including 0.12.2 contain an uncontrolled resource consumption vulnerability in the VannaPack VannaQueryEngine implementation. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Llamaindex
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2024-14021 HIGH POC This Week

LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. [CVSS 7.8 HIGH]

Deserialization AI / ML Llamaindex
NVD GitHub
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-6211 MEDIUM POC PATCH This Month

A vulnerability in the DocugamiReader class of the run-llama/llama_index repository, up to version 0.12.28, involves the use of MD5 hashing to generate IDs for document chunks. This approach leads to hash collisions when structurally distinct chunks contain identical text, resulting in one chunk overwriting another. This can cause loss of semantically or legally important document content, breakage of parent-child chunk hierarchies, and inaccurate or hallucinated responses in AI outputs. The issue is resolved in version 0.3.1.

Information Disclosure Llamaindex Redhat
NVD GitHub
CVSS 3.0
6.5
EPSS
0.1%
CVE-2025-6209 HIGH POC PATCH This Week

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.

Path Traversal Llamaindex Redhat
NVD GitHub
CVSS 3.0
7.5
EPSS
0.1%
CVE-2025-6210 MEDIUM POC PATCH This Month

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

Path Traversal Llamaindex D-Link Redhat
NVD GitHub
CVSS 3.0
6.2
EPSS
0.0%
CVE-2025-5472 MEDIUM POC PATCH This Month

The JSONReader in run-llama/llama_index versions 0.12.28 is vulnerable to a stack overflow due to uncontrolled recursive JSON parsing. This vulnerability allows attackers to trigger a Denial of Service (DoS) by submitting deeply nested JSON structures, leading to a RecursionError and crashing applications. The root cause is the unsafe recursive traversal design and lack of depth validation, which makes the JSONReader susceptible to stack overflow when processing deeply nested JSON. This impacts the availability of services, making them unreliable and disrupting workflows. The issue is resolved in version 0.12.38.

Denial Of Service Llamaindex Redhat
NVD GitHub
CVSS 3.0
6.5
EPSS
0.0%
CVE-2025-3225 HIGH POC PATCH This Week

An XML Entity Expansion vulnerability, also known as a 'billion laughs' attack, exists in the sitemap parser of the run-llama/llama_index repository, specifically affecting version v0.12.21. This vulnerability allows an attacker to supply a malicious Sitemap XML, leading to a Denial of Service (DoS) by exhausting system memory and potentially causing a system crash. The issue is resolved in version v0.12.29.

Denial Of Service Llamaindex Redhat
NVD GitHub
CVSS 3.0
7.5
EPSS
0.1%
CVE-2025-3046 HIGH POC PATCH This Week

A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information.

Path Traversal Llamaindex Redhat
NVD GitHub
CVSS 3.0
7.5
EPSS
0.1%
CVE-2025-3044 MEDIUM POC PATCH This Month

A vulnerability in the ArxivReader class of the run-llama/llama_index repository, versions up to v0.12.22.post1, allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in version 0.12.28.

Information Disclosure Llamaindex Redhat
NVD GitHub
CVSS 3.0
5.3
EPSS
0.0%
CVE-2025-3108 HIGH POC PATCH This Week

A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines.

Deserialization RCE Python Llamaindex
NVD GitHub
CVSS 3.1
7.5
EPSS
0.9%
CVE-2025-1793 CRITICAL POC PATCH Act Now

Critical SQL injection vulnerability affecting run-llama/llama_index v0.12.21 and potentially other versions, present in multiple vector store integrations. Attackers can execute arbitrary SQL commands without authentication to read and write data, potentially compromising data belonging to other users in web applications leveraging this library. With a CVSS 9.8 severity score, network-accessible attack vector, and no authentication required, this vulnerability poses an immediate and severe risk to production deployments.

SQLi Authentication Bypass Llamaindex Redhat
NVD GitHub
CVSS 3.0
9.8
EPSS
0.0%
CVE-2025-1750 CRITICAL POC PATCH Act Now

SQL injection in llama_index DuckDB vector store v0.12.19. PoC and patch available.

SQLi RCE Llamaindex
NVD GitHub
CVSS 3.0
9.8
EPSS
0.6%
CVE-2025-1753 HIGH POC PATCH This Month

LLama-Index CLI version v0.12.20 contains an OS command injection vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. Public exploit code available.

Command Injection RCE Llamaindex Redhat
NVD GitHub
CVSS 3.0
7.8
EPSS
0.1%
CVE-2025-1752 HIGH POC PATCH This Week

A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Python Denial Of Service Llamaindex Redhat
NVD GitHub
CVSS 3.0
7.5
EPSS
0.2%
CVE-2024-12911 HIGH POC PATCH This Month

A vulnerability in the `default_jsonalyzer` function of the `JSONalyzeQueryEngine` in the run-llama/llama_index repository allows for SQL injection via prompt injection. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

SQLi Llamaindex Redhat
NVD GitHub
CVSS 3.0
7.1
EPSS
0.2%
CVE-2024-12910 MEDIUM POC PATCH This Month

A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index repository, version latest, allows an attacker to cause a Denial of Service (DoS) by controlling a URL variable to. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. Public exploit code available.

Denial Of Service Llamaindex Redhat
NVD GitHub
CVSS 3.1
5.9
EPSS
0.3%
CVE-2024-12909 CRITICAL POC PATCH Act Now

A vulnerability in the FinanceChatLlamaPack of the run-llama/llama_index repository, versions up to v0.12.3, allows for SQL injection in the `run_sql_query` function of the `database_agent`. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

RCE SQLi PostgreSQL Llamaindex
NVD GitHub
CVSS 3.1
9.8
EPSS
0.7%
CVE-2024-12704 HIGH POC PATCH This Week

A vulnerability in the LangChainLLM class of the run-llama/llama_index repository, version v0.12.5, allows for a Denial of Service (DoS) attack. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Denial Of Service Llamaindex Langchain AI / ML Redhat
NVD GitHub
CVSS 3.0
7.5
EPSS
0.1%
CVE-2024-11958 CRITICAL POC PATCH Act Now

A SQL injection vulnerability exists in the `duckdb_retriever` component of the run-llama/llama_index repository, specifically in the latest version. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

RCE SQLi Llamaindex
NVD GitHub
CVSS 3.0
9.8
EPSS
1.2%
CVE-2024-58339
EPSS 0% CVSS 7.5
HIGH POC This Week

LlamaIndex (run-llama/llama_index) versions up to and including 0.12.2 contain an uncontrolled resource consumption vulnerability in the VannaPack VannaQueryEngine implementation. [CVSS 7.5 HIGH]

Denial Of Service AI / ML Llamaindex
NVD GitHub
CVE-2024-14021
EPSS 0% CVSS 7.8
HIGH POC This Week

LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. [CVSS 7.8 HIGH]

Deserialization AI / ML Llamaindex
NVD GitHub
CVE-2025-6211
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

A vulnerability in the DocugamiReader class of the run-llama/llama_index repository, up to version 0.12.28, involves the use of MD5 hashing to generate IDs for document chunks. This approach leads to hash collisions when structurally distinct chunks contain identical text, resulting in one chunk overwriting another. This can cause loss of semantically or legally important document content, breakage of parent-child chunk hierarchies, and inaccurate or hallucinated responses in AI outputs. The issue is resolved in version 0.3.1.

Information Disclosure Llamaindex Redhat
NVD GitHub
CVE-2025-6209
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.

Path Traversal Llamaindex Redhat
NVD GitHub
CVE-2025-6210
EPSS 0% CVSS 6.2
MEDIUM POC PATCH This Month

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

Path Traversal Llamaindex D-Link +1
NVD GitHub
CVE-2025-5472
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

The JSONReader in run-llama/llama_index versions 0.12.28 is vulnerable to a stack overflow due to uncontrolled recursive JSON parsing. This vulnerability allows attackers to trigger a Denial of Service (DoS) by submitting deeply nested JSON structures, leading to a RecursionError and crashing applications. The root cause is the unsafe recursive traversal design and lack of depth validation, which makes the JSONReader susceptible to stack overflow when processing deeply nested JSON. This impacts the availability of services, making them unreliable and disrupting workflows. The issue is resolved in version 0.12.38.

Denial Of Service Llamaindex Redhat
NVD GitHub
CVE-2025-3225
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

An XML Entity Expansion vulnerability, also known as a 'billion laughs' attack, exists in the sitemap parser of the run-llama/llama_index repository, specifically affecting version v0.12.21. This vulnerability allows an attacker to supply a malicious Sitemap XML, leading to a Denial of Service (DoS) by exhausting system memory and potentially causing a system crash. The issue is resolved in version v0.12.29.

Denial Of Service Llamaindex Redhat
NVD GitHub
CVE-2025-3046
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information.

Path Traversal Llamaindex Redhat
NVD GitHub
CVE-2025-3044
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

A vulnerability in the ArxivReader class of the run-llama/llama_index repository, versions up to v0.12.22.post1, allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in version 0.12.28.

Information Disclosure Llamaindex Redhat
NVD GitHub
CVE-2025-3108
EPSS 1% CVSS 7.5
HIGH POC PATCH This Week

A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines.

Deserialization RCE Python +1
NVD GitHub
CVE-2025-1793
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Critical SQL injection vulnerability affecting run-llama/llama_index v0.12.21 and potentially other versions, present in multiple vector store integrations. Attackers can execute arbitrary SQL commands without authentication to read and write data, potentially compromising data belonging to other users in web applications leveraging this library. With a CVSS 9.8 severity score, network-accessible attack vector, and no authentication required, this vulnerability poses an immediate and severe risk to production deployments.

SQLi Authentication Bypass Llamaindex +1
NVD GitHub
CVE-2025-1750
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

SQL injection in llama_index DuckDB vector store v0.12.19. PoC and patch available.

SQLi RCE Llamaindex
NVD GitHub
CVE-2025-1753
EPSS 0% CVSS 7.8
HIGH POC PATCH This Month

LLama-Index CLI version v0.12.20 contains an OS command injection vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. Public exploit code available.

Command Injection RCE Llamaindex +1
NVD GitHub
CVE-2025-1752
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Python Denial Of Service Llamaindex +1
NVD GitHub
CVE-2024-12911
EPSS 0% CVSS 7.1
HIGH POC PATCH This Month

A vulnerability in the `default_jsonalyzer` function of the `JSONalyzeQueryEngine` in the run-llama/llama_index repository allows for SQL injection via prompt injection. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

SQLi Llamaindex Redhat
NVD GitHub
CVE-2024-12910
EPSS 0% CVSS 5.9
MEDIUM POC PATCH This Month

A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index repository, version latest, allows an attacker to cause a Denial of Service (DoS) by controlling a URL variable to. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. Public exploit code available.

Denial Of Service Llamaindex Redhat
NVD GitHub
CVE-2024-12909
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

A vulnerability in the FinanceChatLlamaPack of the run-llama/llama_index repository, versions up to v0.12.3, allows for SQL injection in the `run_sql_query` function of the `database_agent`. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

RCE SQLi PostgreSQL +1
NVD GitHub
CVE-2024-12704
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

A vulnerability in the LangChainLLM class of the run-llama/llama_index repository, version v0.12.5, allows for a Denial of Service (DoS) attack. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Denial Of Service Llamaindex Langchain +2
NVD GitHub
CVE-2024-11958
EPSS 1% CVSS 9.8
CRITICAL POC PATCH Act Now

A SQL injection vulnerability exists in the `duckdb_retriever` component of the run-llama/llama_index repository, specifically in the latest version. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

RCE SQLi Llamaindex
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy