VYPR
Critical severityNVD Advisory· Published Aug 22, 2024· Updated Nov 25, 2024

CVE-2024-45201

CVE-2024-45201

Description

An issue was discovered in llama_index before 0.10.38. download/integration.py includes an exec call for import {cls_name}.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An `exec` call on unsanitized dynamic input in llama_index before 0.10.38 allows remote code execution via a crafted integration import.

Vulnerability

The vulnerability resides in the download/integration.py module of llama_index (now LlamaIndex) versions prior to 0.10.38. The file includes an exec call for import {cls_name} where cls_name is derived from user-controlled input without sanitization [1][2]. This directly embeds attacker-supplied strings into a Python exec statement, enabling arbitrary code execution.

Exploitation

No authentication or special network position is required if the application exposes any endpoint or functionality that processes integration names (e.g., through a package download or dynamic import feature). An attacker can supply a malicious cls_name containing Python code (e.g., os.system(...) or a payload that exfiltrates data) which will be executed by exec [1][4]. The fix, implemented in pull request #13523, removes the exec call entirely [2].

Impact

Successful exploitation gives the attacker arbitrary code execution in the context of the llama_index process. This can lead to full compromise of the affected system, including data theft, installation of backdoors, or lateral movement within the network [4]. No CVSS score is provided in the available references, but the vulnerability is critical due to the lack of preconditions.

Mitigation

Users should immediately upgrade to llama_index version 0.10.38 or later, where the exec has been removed [2][3]. No workarounds are described; upgrading is the only reliable mitigation.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
llama-index-corePyPI
< 0.10.380.10.38

Affected products

2

Patches

1
bd827c30484f

remove exec from download_integration (#13523)

1 file changed · +0 1
  • llama-index-core/llama_index/core/download/integration.py+0 1 modified
    @@ -18,7 +18,6 @@ def download_integration(module_str: str, module_import_str: str, cls_name: str)
             raise Exception(f"Failed to pip install `{module_str}`") from e
     
         try:
    -        exec(f"from {module_import_str} import {cls_name}")
             module_spec = importlib.util.find_spec(module_import_str)
             module = importlib.util.module_from_spec(module_spec)
             module_spec.loader.exec_module(module)
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.