CVE-2025-3108
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-06

Last updated on: 2025-07-30

Assigner: huntr.dev

Description
A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-06
Last Modified
2025-07-30
Generated
2026-05-07
AI Q&A
2025-07-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
llamaindex llamaindex From 0.12.27 (inc) to 0.12.41 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1112 The document does not fully define all mechanisms that are used to control or influence how product-specific programs are executed.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a critical deserialization flaw in the run-llama/llama_index library's JsonPickleSerializer component. It occurs because the component insecurely falls back to using Python's pickle.loads() for deserialization, which can execute arbitrary code if given malicious input. This means attackers can craft malicious payloads that, when deserialized, allow them to execute code remotely on the affected system.


How can this vulnerability impact me? :

The vulnerability can lead to remote code execution, allowing attackers to run arbitrary code on your system. This can result in full system compromise, potentially giving attackers control over your environment, access to sensitive data, and the ability to disrupt services.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart