A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 06 Jul 2025 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines. | |
Title | Unsafe Deserialization in JsonPickleSerializer Enables Remote Code Execution in run-llama/llama_index | |
Weaknesses | CWE-1112 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-07-06T22:47:25.655Z
Updated: 2025-07-07T13:43:12.649Z
Reserved: 2025-04-02T06:33:56.248Z
Link: CVE-2025-3108

Updated: 2025-07-07T13:42:19.329Z

Status : Received
Published: 2025-07-06T23:15:21.777
Modified: 2025-07-06T23:15:21.777
Link: CVE-2025-3108

No data.