CVE-2025-3108

Source
https://cve.org/CVERecord?id=CVE-2025-3108
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-3108.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-3108
Aliases
Published
2025-07-06T23:15:21.777Z
Modified
2026-04-10T05:24:55.008022Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines.

References

Affected packages

Git / github.com/run-llama/llama_index

Affected ranges

Type
GIT
Repo
https://github.com/run-llama/llama_index
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.12.27"
        },
        {
            "fixed": "0.12.41"
        }
    ]
}

Affected versions

v0.*
v0.12.27
v0.12.28
v0.12.29
v0.12.30
v0.12.31
v0.12.32
v0.12.33
v0.12.34
v0.12.34.post1
v0.12.34.post2
v0.12.35
v0.12.36
v0.12.37
v0.12.38
v0.12.39
v0.12.40

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-3108.json"