CVE-2025-3046: LlamaIndex is vulnerable to Path Traversal attack through its ObsidianReader class
A vulnerability in the ObsidianReader
class in LlamaIndex Readers Integration: Obsidian before version 0.5.1 from the run-llama/llama_index repository (versions 0.12.23 to 0.12.28) allows for arbitrary file read through symbolic links. The ObsidianReader
fails to resolve symlinks to their real paths and does not validate whether the resolved paths lie within the intended directory. This flaw enables attackers to place symlinks pointing to files outside the vault directory, which are then processed as valid Markdown files, potentially exposing sensitive information.
References
- github.com/advisories/GHSA-fmrf-6jv9-qjc7
- github.com/run-llama/llama_index
- github.com/run-llama/llama_index/commit/0008041e8dde8e519621388e5d6f558bde6ef42e
- github.com/run-llama/llama_index/commit/266eb3b3a61f158112726d75a5f5f0b90e34ded0
- github.com/run-llama/llama_index/pull/18320
- huntr.com/bounties/90a1f1b2-bb82-4d66-9fc1-856ed5f904da
- nvd.nist.gov/vuln/detail/CVE-2025-3046
Code Behaviors & Features
Detect and mitigate CVE-2025-3046 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →