CVE-2025-3108

medium

Description

A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines.

References

https://huntr.com/bounties/9b55a5e8-74e6-4241-b323-e360dc8b110a

https://github.com/run-llama/llama_index/commit/702e4340623092fac4cf2fe95eb9465034856da3

Details

Source: Mitre, NVD

Published: 2025-07-06

Updated: 2025-07-08

Risk Information

CVSS v2

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Severity: Medium

EPSS

EPSS: 0.00184