LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserialize multi_embed_store.pkl from a user-supplied persist_dir without validation. An attacker who can provide a crafted persist directory containing a malicious pickle file can trigger arbitrary code execution when the victim loads the index from disk.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Run-llama
Run-llama llama Index |
|
| Vendors & Products |
Run-llama
Run-llama llama Index |
Mon, 12 Jan 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserialize multi_embed_store.pkl from a user-supplied persist_dir without validation. An attacker who can provide a crafted persist directory containing a malicious pickle file can trigger arbitrary code execution when the victim loads the index from disk. | |
| Title | LlamaIndex <= 0.11.6 BGEM3Index Unsafe Deserialization | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-12T23:04:43.095Z
Updated: 2026-01-13T16:23:36.237Z
Reserved: 2026-01-09T20:42:56.495Z
Link: CVE-2024-14021
Updated: 2026-01-13T16:23:32.528Z
Status : Awaiting Analysis
Published: 2026-01-12T23:15:51.413
Modified: 2026-01-13T14:03:18.990
Link: CVE-2024-14021
No data.