Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. llama-index-core
  4. ›
  5. CVE-2024-3098

CVE-2024-3098: llama-index-core Prompt Injection vulnerability leading to Arbitrary Code Execution

April 10, 2024

A vulnerability was identified in the exec_utils class of the llama_index package, specifically within the safe_eval function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.

References

  • github.com/advisories/GHSA-wvpx-g427-q9wc
  • github.com/run-llama/llama_index
  • github.com/run-llama/llama_index/commit/2c92e88838a5f481d50840240b1dd3180066c6f5
  • github.com/run-llama/llama_index/commit/5fbcb5a8b9f20f81b791c7fc8849e352613ab475
  • huntr.com/bounties/1bce0d61-ad03-4b22-bc32-8f99f92974e7
  • nvd.nist.gov/vuln/detail/CVE-2024-3098

Code Behaviors & Features

Detect and mitigate CVE-2024-3098 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.10.24

Fixed versions

  • 0.10.24

Solution

Upgrade to version 0.10.24 or above.

Impact 9.8 CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

pypi/llama-index-core/CVE-2024-3098.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:49 +0000.