{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T09:03:52.871","vulnerabilities":[{"cve":{"id":"CVE-2025-3044","sourceIdentifier":"security@huntr.dev","published":"2025-07-07T10:15:26.717","lastModified":"2025-07-30T21:28:24.923","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the ArxivReader class of the run-llama/llama_index repository, versions up to v0.12.22.post1, allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in version 0.12.28."},{"lang":"es","value":"Una vulnerabilidad en la clase ArxivReader del repositorio run-llama/llama_index, versiones hasta la v0.12.22.post1, permite colisiones de hash MD5 al generar nombres de archivo para artículos descargados. Esto puede provocar la pérdida de datos, ya que artículos con títulos idénticos pero contenido diferente pueden sobrescribirse, impidiendo que algunos artículos se procesen para el entrenamiento de modelos de IA. El problema se ha resuelto en la versión 0.12.28."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-440"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*","versionEndExcluding":"0.12.28","matchCriteriaId":"918714E3-A9E1-4D93-B6A5-7B5E0EE9EFF3"}]}]}],"references":[{"url":"https://github.com/run-llama/llama_index/commit/0008041e8dde8e519621388e5d6f558bde6ef42e","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/80182c3a-876f-422f-8bac-38267e0345d6","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]},{"url":"https://huntr.com/bounties/80182c3a-876f-422f-8bac-38267e0345d6","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]}]}}]}