A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-20210 LlamaIndex vulnerability in its ObsidianReader class can lead to Path Traversal exploit
Github GHSA Github GHSA GHSA-3j8r-jf9w-5cmh LlamaIndex vulnerability in its ObsidianReader class can lead to Path Traversal exploit
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Llamaindex
Llamaindex llamaindex
CPEs cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*
Vendors & Products Llamaindex
Llamaindex llamaindex

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00015}

epss

{'score': 0.00019}


Tue, 08 Jul 2025 00:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 07 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 07 Jul 2025 10:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.
Title Hardlink-Based Path Traversal in run-llama/llama_index
Weaknesses CWE-22
References
Metrics cvssV3_0

{'score': 6.2, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-07-07T12:17:09.857Z

Reserved: 2025-06-17T17:35:10.416Z

Link: CVE-2025-6210

cve-icon Vulnrichment

Updated: 2025-07-07T12:17:03.273Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-07T10:15:29.040

Modified: 2025-07-30T20:01:47.780

Link: CVE-2025-6210

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-07-07T09:55:46Z

Links: CVE-2025-6210 - Bugzilla

cve-icon OpenCVE Enrichment

No data.