CVE-2024-3271

A command injection vulnerability exists in the run-llama/llama_index repository, specifically within the safe_eval function. Attackers can bypass the intended security mechanism, which checks for the presence of underscores in code generated by LLM, to execute arbitrary code. This is achieved by crafting input that does not contain an underscore but still results in the execution of OS commands. The vulnerability allows for remote code execution (RCE) on the server hosting the application.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*

History

30 Jul 2025, 00:14

Type Values Removed Values Added
First Time Llamaindex llamaindex
Llamaindex
References () https://huntr.com/bounties/9b32490e-7cf9-470e-8d49-ba083ae7a279 - () https://huntr.com/bounties/9b32490e-7cf9-470e-8d49-ba083ae7a279 - Exploit, Third Party Advisory
References () https://github.com/run-llama/llama_index/commit/5fbcb5a8b9f20f81b791c7fc8849e352613ab475 - () https://github.com/run-llama/llama_index/commit/5fbcb5a8b9f20f81b791c7fc8849e352613ab475 - Patch
CWE CWE-77
CPE cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*

16 Apr 2024, 13:24

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 00:15

Updated : 2025-07-30 00:14


NVD link : CVE-2024-3271

Mitre link : CVE-2024-3271


JSON object : View

Products Affected

llamaindex

  • llamaindex
CWE

No CWE.