We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3108

Unsafe Deserialization in JsonPickleSerializer Enables Remote Code Execution in run-llama/llama_index



Description

A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines.

Reserved 2025-04-02 | Published 2025-07-06 | Updated 2025-07-06 | Assigner @huntr_ai


MEDIUM: 5.0CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Problem types

CWE-1112 Incomplete Documentation of Program Execution

Product status

Any version before v0.12.41
affected

References

huntr.com/bounties/9b55a5e8-74e6-4241-b323-e360dc8b110a

github.com/...ommit/702e4340623092fac4cf2fe95eb9465034856da3

cve.org (CVE-2025-3108)

nvd.nist.gov (CVE-2025-3108)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3108

Support options

Helpdesk Chat, Email, Knowledgebase