ghsa-g99h-56mw-8263
Vulnerability from github
Published
2025-05-28 12:30
Modified
2025-05-28 16:07
Severity ?
Summary
LLama-Index CLI OS command injection vulnerability
Details
LLama-Index CLI prior to v0.4.1, corresponding to LLama-Index prior to v0.12.21, contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the --files
argument, which is directly passed into os.system
. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "llama-index-cli" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.4.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-1753" ], "database_specific": { "cwe_ids": [ "CWE-78" ], "github_reviewed": true, "github_reviewed_at": "2025-05-28T16:07:48Z", "nvd_published_at": "2025-05-28T10:15:21Z", "severity": "HIGH" }, "details": "LLama-Index CLI prior to v0.4.1, corresponding to LLama-Index prior to v0.12.21, contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the `--files` argument, which is directly passed into `os.system`. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system.", "id": "GHSA-g99h-56mw-8263", "modified": "2025-05-28T16:07:48Z", "published": "2025-05-28T12:30:33Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1753" }, { "type": "WEB", "url": "https://github.com/run-llama/llama_index/commit/b57e76738c53ca82d88658b82f2d82d1c7839c7d" }, { "type": "PACKAGE", "url": "https://github.com/run-llama/llama_index" }, { "type": "WEB", "url": "https://huntr.com/bounties/19e1c67e-1d77-451d-b10b-acbe99900b22" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "LLama-Index CLI OS command injection vulnerability" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.