A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.
History

Mon, 07 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 07 Jul 2025 12:30:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.
Title Arbitrary File Read through Path Traversal in run-llama/llama_index
Weaknesses CWE-29
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-07-07T12:21:10.767Z

Updated: 2025-07-07T13:45:55.539Z

Reserved: 2025-06-17T17:33:02.165Z

Link: CVE-2025-6209

cve-icon Vulnrichment

Updated: 2025-07-07T13:45:52.485Z

cve-icon NVD

Status : Received

Published: 2025-07-07T13:15:28.823

Modified: 2025-07-07T14:15:25.287

Link: CVE-2025-6209

cve-icon Redhat

No data.