A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines.
References
| Link | Resource |
|---|---|
| https://github.com/run-llama/llama_index/commit/d73715eaf0642705583e7897c78b9c8dd2d3a7ba | Patch |
| https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1 | Exploit Third Party Advisory |
| https://github.com/run-llama/llama_index/commit/d73715eaf0642705583e7897c78b9c8dd2d3a7ba | Patch |
| https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1 | Exploit Third Party Advisory |
Configurations
History
21 Oct 2025, 11:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:* | |
| References | () https://github.com/run-llama/llama_index/commit/d73715eaf0642705583e7897c78b9c8dd2d3a7ba - Patch | |
| References | () https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1 - Exploit, Third Party Advisory | |
| First Time |
Llamaindex
Llamaindex llamaindex |
Information
Published : 2024-05-16 09:15
Updated : 2025-10-21 11:36
NVD link : CVE-2024-4181
Mitre link : CVE-2024-4181
CVE.ORG link : CVE-2024-4181
JSON object : View
Products Affected
llamaindex
- llamaindex
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
