{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T17:27:02.873","vulnerabilities":[{"cve":{"id":"CVE-2024-12909","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:31.833","lastModified":"2025-07-30T01:00:18.577","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the FinanceChatLlamaPack of the run-llama/llama_index repository, versions up to v0.12.3, allows for SQL injection in the `run_sql_query` function of the `database_agent`. This vulnerability can be exploited by an attacker to inject arbitrary SQL queries, leading to remote code execution (RCE) through the use of PostgreSQL's large object functionality. The issue is fixed in version 0.3.0."},{"lang":"es","value":"Una vulnerabilidad en FinanceChatLlamaPack del repositorio run-llama/llama_index, versiones hasta la v0.12.3, permite la inyección de SQL en la función `run_sql_query` del `database_agent`. Un atacante puede explotar esta vulnerabilidad para inyectar consultas SQL arbitrarias, lo que provoca la ejecución remota de código (RCE) mediante la funcionalidad de objetos grandes de PostgreSQL. El problema se ha corregido en la versión 0.3.0."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*","versionEndExcluding":"0.3.0","matchCriteriaId":"51D2CB27-95EC-4A51-911A-F916804DBDC9"}]}]}],"references":[{"url":"https://github.com/run-llama/llama_index/commit/5d03c175476452db9b8abcdb7d5767dd7b310a75","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/44e8177f-200a-4ba3-a12c-8bc21e313a3f","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}