Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-7647

Опубликовано: 27 сент. 2025
Источник: redhat
CVSS3: 8.4
EPSS Низкий

Описание

The llama-index-core package, up to version 0.12.44, contains a vulnerability in the get_cache_dir() function where a predictable, hardcoded directory path /tmp/llama_index is used on Linux systems without proper security controls. This vulnerability allows attackers on multi-user systems to steal proprietary models, poison cached embeddings, or conduct symlink attacks. The issue affects all Linux deployments where multiple users share the same system. The vulnerability is classified under CWE-379, CWE-377, and CWE-367, indicating insecure temporary file creation and potential race conditions.

A flaw was found in llama-index-core where the get_cache_dir() function creates a hardcoded /tmp/llamda_index directory without secure permissions or user isolation. On Linux systems with multiple users, this allows attackers to steal cached models, poison embeddings, or perform symlink attacks leading to information disclosure or data corruption.

Отчет

The impact is IMPORTANT because this flaw affects confidentiality, integrity and availability. An attacker on the same vulnerable system can copy cached model files, poison embeddings to manipulate AI outputs, or create symlinks to overwrite important files. The issue exists in all versions up to and including 0.12.44 and is caused by insecure temporary directory creation and missing permission controls in /tmp.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Lightspeedopenshift-lightspeed/lightspeed-service-api-rhel9Affected
OpenShift Lightspeedopenshift-lightspeed-tech-preview/lightspeed-rag-tool-rhel9Affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-minimal-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-minimal-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-supported-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/de-supported-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-supported-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-supported-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-378
https://bugzilla.redhat.com/show_bug.cgi?id=2399917llama-index-core: Insecure Temporary File Handling in run-llama/llama_index

EPSS

Процентиль: 4%
0.00017
Низкий

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
6 месяцев назад

The llama-index-core package, up to version 0.12.44, contains a vulnerability in the `get_cache_dir()` function where a predictable, hardcoded directory path `/tmp/llama_index` is used on Linux systems without proper security controls. This vulnerability allows attackers on multi-user systems to steal proprietary models, poison cached embeddings, or conduct symlink attacks. The issue affects all Linux deployments where multiple users share the same system. The vulnerability is classified under CWE-379, CWE-377, and CWE-367, indicating insecure temporary file creation and potential race conditions.

CVSS3: 7.3
github
6 месяцев назад

llama-index-core insecurely handles temporary files

CVSS3: 7.3
fstec
9 месяцев назад

Уязвимость функции get_cache_dir() фреймворка для работы с большими языковыми моделями (LLM) LlamaIndex, позволяющая нарушителю реализовать атаку отравления кэша

EPSS

Процентиль: 4%
0.00017
Низкий

8.4 High

CVSS3