CVE-2024-45201
Description
An issue was discovered in llama_index before 0.10.38. download/integration.py includes an exec call for import {cls_name}.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An `exec` call on unsanitized dynamic input in llama_index before 0.10.38 allows remote code execution via a crafted integration import.
Vulnerability
The vulnerability resides in the download/integration.py module of llama_index (now LlamaIndex) versions prior to 0.10.38. The file includes an exec call for import {cls_name} where cls_name is derived from user-controlled input without sanitization [1][2]. This directly embeds attacker-supplied strings into a Python exec statement, enabling arbitrary code execution.
Exploitation
No authentication or special network position is required if the application exposes any endpoint or functionality that processes integration names (e.g., through a package download or dynamic import feature). An attacker can supply a malicious cls_name containing Python code (e.g., os.system(...) or a payload that exfiltrates data) which will be executed by exec [1][4]. The fix, implemented in pull request #13523, removes the exec call entirely [2].
Impact
Successful exploitation gives the attacker arbitrary code execution in the context of the llama_index process. This can lead to full compromise of the affected system, including data theft, installation of backdoors, or lateral movement within the network [4]. No CVSS score is provided in the available references, but the vulnerability is critical due to the lack of preconditions.
Mitigation
Users should immediately upgrade to llama_index version 0.10.38 or later, where the exec has been removed [2][3]. No workarounds are described; upgrading is the only reliable mitigation.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
llama-index-corePyPI | < 0.10.38 | 0.10.38 |
Affected products
2- llama_index/llama_indexdescription
Patches
1bd827c30484fremove exec from download_integration (#13523)
1 file changed · +0 −1
llama-index-core/llama_index/core/download/integration.py+0 −1 modified@@ -18,7 +18,6 @@ def download_integration(module_str: str, module_import_str: str, cls_name: str) raise Exception(f"Failed to pip install `{module_str}`") from e try: - exec(f"from {module_import_str} import {cls_name}") module_spec = importlib.util.find_spec(module_import_str) module = importlib.util.module_from_spec(module_spec) module_spec.loader.exec_module(module)
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-fxc2-8m62-m85xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-45201ghsaADVISORY
- github.com/pypa/advisory-database/tree/main/vulns/llama-index/PYSEC-2024-192.yamlghsaWEB
- github.com/run-llama/llama_index/commit/bd827c30484fa085ec769fa55dc7f2add8006ac8ghsaWEB
- github.com/run-llama/llama_index/compare/v0.10.37...v0.10.38ghsaWEB
- github.com/run-llama/llama_index/pull/13523ghsaWEB
News mentions
0No linked articles in our index yet.