The llama_index library version 0.12.33 sets the NLTK data directory to a subdirectory of the codebase by default, which is world-writable in multi-user environments. This configuration allows local users to overwrite, delete, or corrupt NLTK data files, leading to potential denial of service, data tampering, or privilege escalation. The vulnerability arises from the use of a shared cache directory instead of a user-specific one, making it susceptible to local data tampering and denial of service.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rg9h-vx28-xxp5 llama-index has Insecure Temporary File
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 14 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}

threat_severity

Moderate


Mon, 13 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
Description The llama_index library version 0.12.33 sets the NLTK data directory to a subdirectory of the codebase by default, which is world-writable in multi-user environments. This configuration allows local users to overwrite, delete, or corrupt NLTK data files, leading to potential denial of service, data tampering, or privilege escalation. The vulnerability arises from the use of a shared cache directory instead of a user-specific one, making it susceptible to local data tampering and denial of service.
Title World-Writable NLTK Cache Directory Vulnerability in run-llama/llama_index
Weaknesses CWE-377
References
Metrics cvssV3_0

{'score': 7.1, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-10-14T14:32:42.854Z

Reserved: 2025-07-16T12:49:24.649Z

Link: CVE-2025-7707

cve-icon Vulnrichment

Updated: 2025-10-14T14:32:32.401Z

cve-icon NVD

Status : Received

Published: 2025-10-13T17:15:35.243

Modified: 2025-10-13T17:15:35.243

Link: CVE-2025-7707

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-13T16:15:08Z

Links: CVE-2025-7707 - Bugzilla

cve-icon OpenCVE Enrichment

No data.