{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T00:26:32.470","vulnerabilities":[{"cve":{"id":"CVE-2025-3108","sourceIdentifier":"security@huntr.dev","published":"2025-07-06T23:15:21.777","lastModified":"2025-07-30T21:29:05.780","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A critical deserialization vulnerability exists in the run-llama/llama_index library's JsonPickleSerializer component, affecting versions v0.12.27 through v0.12.40. This vulnerability allows remote code execution due to an insecure fallback to Python's pickle module. JsonPickleSerializer prioritizes deserialization using pickle.loads(), which can execute arbitrary code when processing untrusted data. Attackers can exploit this by crafting malicious payloads to achieve full system compromise. The root cause includes an insecure fallback mechanism, lack of validation or safeguards, misleading design, and violation of Python security guidelines."},{"lang":"es","value":"Existe una vulnerabilidad crítica de deserialización en el componente JsonPickleSerializer de la librería run-llama/llama_index, que afecta a las versiones v0.12.27 a v0.12.40. Esta vulnerabilidad permite la ejecución remota de código debido a un mecanismo de respaldo inseguro al módulo pickle de Python. JsonPickleSerializer prioriza la deserialización mediante pickle.loads(), que puede ejecutar código arbitrario al procesar datos no confiables. Los atacantes pueden explotar esto manipulando payloads maliciosos para comprometer completamente el sistema. La causa principal incluye un mecanismo de respaldo inseguro, falta de validación o salvaguardas, un diseño engañoso y la violación de las directrices de seguridad de Python."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L","baseScore":5.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":3.4}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-1112"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*","versionStartIncluding":"0.12.27","versionEndExcluding":"0.12.41","matchCriteriaId":"D4D93641-C6B4-4DA6-84A2-0676E69EEFFB"}]}]}],"references":[{"url":"https://github.com/run-llama/llama_index/commit/702e4340623092fac4cf2fe95eb9465034856da3","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/9b55a5e8-74e6-4241-b323-e360dc8b110a","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}