LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserialize multi_embed_store.pkl from a user-supplied persist_dir without validation. An attacker who can provide a crafted persist directory containing a malicious pickle file can trigger arbitrary code execution when the victim loads the index from disk.
References
| Link | Resource |
|---|---|
| https://github.com/run-llama/llama_index | Product |
| https://huntr.com/bounties/ab4ceeb4-aa85-4d1c-aaca-4eda1b71fc12 | Exploit Third Party Advisory |
| https://www.llamaindex.ai/ | Product |
| https://www.vulncheck.com/advisories/llamaindex-bgem3index-unsafe-deserialization | Third Party Advisory |
Configurations
History
15 Jan 2026, 22:39
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Llamaindex
Llamaindex llamaindex |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:* | |
| References | () https://github.com/run-llama/llama_index - Product | |
| References | () https://huntr.com/bounties/ab4ceeb4-aa85-4d1c-aaca-4eda1b71fc12 - Exploit, Third Party Advisory | |
| References | () https://www.llamaindex.ai/ - Product | |
| References | () https://www.vulncheck.com/advisories/llamaindex-bgem3index-unsafe-deserialization - Third Party Advisory |
12 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-12 23:15
Updated : 2026-01-15 22:39
NVD link : CVE-2024-14021
Mitre link : CVE-2024-14021
CVE.ORG link : CVE-2024-14021
JSON object : View
Products Affected
llamaindex
- llamaindex
CWE
CWE-502
Deserialization of Untrusted Data
