CVE-2024-4181

A command injection vulnerability exists in the RunGptLLM class of the llama_index library, version 0.9.47, used by the RunGpt framework from JinaAI to connect to Language Learning Models (LLMs). The vulnerability arises from the improper use of the eval function, allowing a malicious or compromised LLM hosting provider to execute arbitrary commands on the client's machine. This issue was fixed in version 0.10.13. The exploitation of this vulnerability could lead to a hosting provider gaining full control over client machines.
Configurations

Configuration 1 (hide)

cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*

History

21 Oct 2025, 11:36

Type Values Removed Values Added
CPE cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*
References () https://github.com/run-llama/llama_index/commit/d73715eaf0642705583e7897c78b9c8dd2d3a7ba - () https://github.com/run-llama/llama_index/commit/d73715eaf0642705583e7897c78b9c8dd2d3a7ba - Patch
References () https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1 - () https://huntr.com/bounties/1a204520-598a-434e-b13d-0d34f2a5ddc1 - Exploit, Third Party Advisory
First Time Llamaindex
Llamaindex llamaindex

Information

Published : 2024-05-16 09:15

Updated : 2025-10-21 11:36


NVD link : CVE-2024-4181

Mitre link : CVE-2024-4181

CVE.ORG link : CVE-2024-4181


JSON object : View

Products Affected

llamaindex

  • llamaindex
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')