प्लेटफ़ॉर्म
python
घटक
llama_index
में ठीक किया गया
0.3.1
A critical SQL injection vulnerability has been identified in LlamaIndex, specifically within the delete function of the DuckDBVectorStore component. This flaw allows attackers to manipulate the refdocid parameter, granting them the ability to read and write arbitrary files on the server. Versions of LlamaIndex prior to 0.3.1 are affected. A fix has been released in version 0.3.1.
The impact of this SQL injection vulnerability is severe. Successful exploitation allows an attacker to bypass intended access controls and directly interact with the underlying file system. By crafting malicious SQL queries through the refdocid parameter, an attacker can read sensitive configuration files, source code, or even upload and execute arbitrary code. This could lead to complete compromise of the server, including data exfiltration, denial of service, and remote code execution. The ability to write arbitrary files significantly expands the attack surface beyond simple data retrieval.
This vulnerability is considered high-risk due to its CRITICAL CVSS score and the potential for remote code execution. Public proof-of-concept exploits are likely to emerge, increasing the risk of widespread exploitation. The vulnerability was publicly disclosed on 2025-06-02. It is recommended to monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns.
Applications utilizing LlamaIndex for document indexing and retrieval, particularly those deployed in production environments, are at risk. Organizations relying on LlamaIndex for sensitive data processing or integration with critical systems should prioritize patching. Shared hosting environments where LlamaIndex is installed alongside other applications are also at increased risk due to potential cross-contamination.
• python / application:
import os
import subprocess
def check_llama_index_version():
try:
result = subprocess.check_output(['pip', 'show', 'llama_index'], stderr=subprocess.STDOUT, text=True)
for line in result.splitlines():
if line.startswith('Version:'):
version = line.split(':')[1].strip()
if version <= '0.3.1':
return True
else:
return False
except FileNotFoundError:
return False
if check_llama_index_version():
print("LlamaIndex version is vulnerable. Upgrade to 0.3.1 or later.")
else:
print("LlamaIndex version is not vulnerable.")• generic web: Monitor application logs for SQL errors or unusual database queries involving the refdocid parameter. Look for attempts to read or write files outside of expected directories.
disclosure
एक्सप्लॉइट स्थिति
EPSS
0.63% (70% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation is to immediately upgrade LlamaIndex to version 0.3.1 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing input validation on the refdocid parameter to prevent SQL injection attempts. This could involve whitelisting allowed characters or using parameterized queries. Additionally, restrict file system access permissions for the LlamaIndex process to minimize the potential damage from a successful exploit. Monitor application logs for unusual database activity or file system modifications.
Actualice la biblioteca LlamaIndex a la versión 0.3.1 o superior. Esta versión corrige la vulnerabilidad de inyección SQL en la función delete de DuckDBVectorStore. La actualización evitará que atacantes manipulen el parámetro ref_doc_id y ejecuten código arbitrario en el servidor.
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2025-1750 is a critical SQL injection vulnerability in LlamaIndex versions up to 0.3.1, allowing attackers to manipulate database queries and potentially gain unauthorized access to files.
If you are using LlamaIndex version 0.3.1 or earlier, you are potentially affected by this vulnerability. Immediately check your version and upgrade if necessary.
The recommended fix is to upgrade LlamaIndex to version 0.3.1 or later. If upgrading is not possible, implement input validation on the refdocid parameter.
While there are no confirmed reports of active exploitation at this time, the vulnerability's severity and potential impact suggest that exploitation is likely to occur.
Refer to the official LlamaIndex security advisories and release notes on their GitHub repository for the most up-to-date information.
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।
अपनी requirements.txt फ़ाइल अपलोड करें और तुरंत जानें कि आप प्रभावित हैं या नहीं।