Home

Description

LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserialize multi_embed_store.pkl from a user-supplied persist_dir without validation. An attacker who can provide a crafted persist directory containing a malicious pickle file can trigger arbitrary code execution when the victim loads the index from disk.

PUBLISHED Reserved 2026-01-09 | Published 2026-01-12 | Updated 2026-01-12 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unknown

Any version
affected

Credits

LifeTeam2024 finder

References

huntr.com/bounties/ab4ceeb4-aa85-4d1c-aaca-4eda1b71fc12 technical-description exploit

www.llamaindex.ai/ product

github.com/run-llama/llama_index third-party-advisory

www.vulncheck.com/...index-bgem3index-unsafe-deserialization third-party-advisory

cve.org (CVE-2024-14021)

nvd.nist.gov (CVE-2024-14021)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.