Headline
GHSA-g99h-56mw-8263: LLama-Index CLI OS command injection vulnerability
LLama-Index CLI prior to v0.4.1, corresponding to LLama-Index prior to v0.12.21, contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the --files
argument, which is directly passed into os.system
. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-1753
LLama-Index CLI OS command injection vulnerability
High severity GitHub Reviewed Published May 28, 2025 to the GitHub Advisory Database • Updated May 28, 2025
Package
pip llama-index-cli (pip)
Affected versions
< 0.4.1
LLama-Index CLI prior to v0.4.1, corresponding to LLama-Index prior to v0.12.21, contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the --files argument, which is directly passed into os.system. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system.
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-1753
- run-llama/llama_index@b57e767
- https://huntr.com/bounties/19e1c67e-1d77-451d-b10b-acbe99900b22
Published to the GitHub Advisory Database
May 28, 2025
Last updated
May 28, 2025