We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6210

Hardlink-Based Path Traversal in run-llama/llama_index



Description

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

Reserved 2025-06-17 | Published 2025-07-07 | Updated 2025-07-07 | Assigner @huntr_ai


MEDIUM: 6.2CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Any version before 0.5.2
affected

References

huntr.com/bounties/a654b322-a509-4448-a1f5-0f22850b4687

github.com/...ommit/a86c96ae0e662492eeb471b658ae849a93f628ff

cve.org (CVE-2025-6210)

nvd.nist.gov (CVE-2025-6210)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6210

Support options

Helpdesk Chat, Email, Knowledgebase