We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3046

Path Traversal via Symbolic Links in run-llama/llama_index



Description

A vulnerability in the `ObsidianReader` class of the run-llama/llama_index repository, versions 0.12.23 to 0.12.28, allows for arbitrary file read through symbolic links. The `ObsidianReader` fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information.

Reserved 2025-03-31 | Published 2025-07-07 | Updated 2025-07-07 | Assigner @huntr_ai


HIGH: 7.5CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Any version before 0.12.28
affected

References

huntr.com/bounties/90a1f1b2-bb82-4d66-9fc1-856ed5f904da

github.com/...ommit/0008041e8dde8e519621388e5d6f558bde6ef42e

cve.org (CVE-2025-3046)

nvd.nist.gov (CVE-2025-3046)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3046

Support options

Helpdesk Chat, Email, Knowledgebase