Логотип exploitDog
bind:CVE-2025-6209
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6209

Количество 4

Количество 4

redhat логотип

CVE-2025-6209

5 месяцев назад

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-6209

5 месяцев назад

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2rhq-96q8-4vjq

5 месяцев назад

LlamaIndex vulnerable to Path Traversal attack through its encode_image function

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-09021

5 месяцев назад

Уязвимость функции encode_image фреймворка для работы с большими языковыми моделями (LLM) LlamaIndex, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-6209

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.

CVSS3: 5.3
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-6209

A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0.12.40, specifically within the `encode_image` function in `generic_utils.py`. This vulnerability allows an attacker to manipulate the `image_path` input to read arbitrary files on the server, including sensitive system files. The issue arises due to improper validation or sanitization of the file path, enabling path traversal sequences to access files outside the intended directory. The vulnerability is fixed in version 0.12.41.

CVSS3: 7.5
0%
Низкий
5 месяцев назад
github логотип
GHSA-2rhq-96q8-4vjq

LlamaIndex vulnerable to Path Traversal attack through its encode_image function

CVSS3: 7.5
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-09021

Уязвимость функции encode_image фреймворка для работы с большими языковыми моделями (LLM) LlamaIndex, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
0%
Низкий
5 месяцев назад

Уязвимостей на страницу