A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 07 Jul 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41. | |
Title | Arbitrary File Read through Path Traversal in run-llama/llama_index | |
Weaknesses | CWE-29 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-07-07T12:21:10.767Z
Updated: 2025-07-07T13:45:55.539Z
Reserved: 2025-06-17T17:33:02.165Z
Link: CVE-2025-6209

Updated: 2025-07-07T13:45:52.485Z

Status : Received
Published: 2025-07-07T13:15:28.823
Modified: 2025-07-07T14:15:25.287
Link: CVE-2025-6209

No data.