{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T22:35:49.176","vulnerabilities":[{"cve":{"id":"CVE-2025-6210","sourceIdentifier":"security@huntr.dev","published":"2025-07-07T10:15:29.040","lastModified":"2025-07-30T20:01:47.780","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":6.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.5,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*","versionEndExcluding":"0.5.2","matchCriteriaId":"8AC070B3-926A-4B3C-B6F4-28DA4B0F1CFF"}]}]}],"references":[{"url":"https://github.com/run-llama/llama_index/commit/a86c96ae0e662492eeb471b658ae849a93f628ff","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/a654b322-a509-4448-a1f5-0f22850b4687","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}