HomeLlamaindexCVE-2025-6210

CVE-2025-6210

MEDIUM
6.2CVSS
Published: 2025-07-07
Updated: 2025-07-30
AI Analysis

Description

A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.

CVSS Metrics

Vector
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
local
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
none
Availability
none
Weaknesses
CWE-22

Metadata

Primary Vendor
LLAMAINDEX
Published
7/7/2025
Last Modified
7/30/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

llamaindex : llamaindex

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-6210 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com