{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T04:23:04.372","vulnerabilities":[{"cve":{"id":"CVE-2024-4181","sourceIdentifier":"security@huntr.dev","published":"2024-05-16T09:15:15.553","lastModified":"2025-10-21T11:36:16.007","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de comandos en la clase RunGptLLM de la librería llama_index, versión 0.9.47, utilizada por el marco RunGpt de JinaAI para conectarse a los modelos de aprendizaje de idiomas (LLM). La vulnerabilidad surge del uso inadecuado de la función de evaluación, lo que permite que un proveedor de alojamiento LLM malicioso o comprometido ejecute comandos arbitrarios en la máquina del cliente. Este problema se solucionó en la versión 0.10.13. La explotación de esta vulnerabilidad podría llevar a que un proveedor de alojamiento obtenga control total sobre las máquinas cliente."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*","versionStartIncluding":"0.9.47","versionEndExcluding":"0.10.13","matchCriteriaId":"34FD9B1D-9DCA-4F40-A413-28B7CC8376E8"}]}]}],"references":[{"url":"https://github.com/run-llama/llama_index/commit/d73715eaf0642705583e7897c78b9c8dd2d3a7ba","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/run-llama/llama_index/commit/d73715eaf0642705583e7897c78b9c8dd2d3a7ba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}