CVE-2025-6209
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-07

Last updated on: 2025-07-30

Assigner: huntr.dev

Description
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-07
Last Modified
2025-07-30
Generated
2026-05-07
AI Q&A
2025-07-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
llamaindex llamaindex From 0.12.27 (inc) to 0.12.41 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-29 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a path traversal issue in the run-llama/llama_index library versions 0.12.27 through 0.12.40, specifically in the encode_image function in generic_utils.py. It allows an attacker to manipulate the image_path input to read arbitrary files on the server, including sensitive system files, by exploiting improper validation or sanitization of the file path. This means an attacker can access files outside the intended directory by using path traversal sequences.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to read sensitive files on your server that should not be accessible, potentially exposing confidential information or system files. Since the attacker can read arbitrary files, this could lead to information disclosure, which might compromise the security of your system or application.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability can negatively affect compliance with standards like GDPR and HIPAA because it allows unauthorized access to sensitive data stored on the server. Exposure of personal data or protected health information due to this vulnerability could lead to violations of data protection regulations, resulting in legal and financial consequences.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can focus on identifying attempts to exploit the path traversal in the `encode_image` function by monitoring for suspicious file path inputs containing traversal sequences (e.g., '../'). Additionally, verifying the version of run-llama/llama_index installed can help detect vulnerable instances (versions 0.12.27 through 0.12.40 are affected). Since the fix involves validating image paths using PIL, you can check logs or application inputs for invalid or unexpected file paths. Specific commands to check the installed version include: `pip show llama_index` or `pip list | grep llama_index`. For runtime detection, monitoring application logs for errors related to image loading or unexpected file access attempts may help. However, no explicit detection commands are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the run-llama/llama_index package to version 0.12.41 or later, where the vulnerability is fixed by adding proper validation of image paths and URLs. This update includes checks using the Python Imaging Library (PIL) to ensure that only valid and accessible images are processed, preventing path traversal attacks. Additionally, reviewing and restricting inputs to the `encode_image` function to prevent arbitrary file path manipulation can help mitigate risk until the update is applied. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart