LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserialize multi_embed_store.pkl from a user-supplied persist_dir without validation. An attacker who can provide a crafted persist directory containing a malicious pickle file can trigger arbitrary code execution when the victim loads the index from disk.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Jan 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserialize multi_embed_store.pkl from a user-supplied persist_dir without validation. An attacker who can provide a crafted persist directory containing a malicious pickle file can trigger arbitrary code execution when the victim loads the index from disk. | |
| Title | LlamaIndex <= 0.11.6 BGEM3Index Unsafe Deserialization | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-12T23:04:43.095Z
Reserved: 2026-01-09T20:42:56.495Z
Link: CVE-2024-14021
No data.
Status : Received
Published: 2026-01-12T23:15:51.413
Modified: 2026-01-12T23:15:51.413
Link: CVE-2024-14021
No data.
OpenCVE Enrichment
No data.