Description
LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserialize multi_embed_store.pkl from a user-supplied persist_dir without validation. An attacker who can provide a crafted persist directory containing a malicious pickle file can trigger arbitrary code execution when the victim loads the index from disk.
References
https://huntr.com/bounties/ab4ceeb4-aa85-4d1c-aaca-4eda1b71fc12
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2026-01-12T23:15:51.413Z
3 days agoLast modified
2026-01-15T22:39:58.527Z
1 hour ago