CVE-2025-1752: CWE-400 Uncontrolled Resource Consumption in run-llama run-llama/llama_index
A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). The vulnerability arises due to inappropriate secure coding measures, specifically the lack of proper implementation of the max_depth parameter in the get_article_urls function. This allows an attacker to exhaust Python's recursion limit through repeated function calls, leading to resource consumption and ultimately crashing the Python process.
AI Analysis
Technical Summary
CVE-2025-1752 is a Denial of Service (DoS) vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the run-llama/llama_index project, specifically within the KnowledgeBaseWebReader class. The vulnerability stems from improper handling of the max_depth parameter in the get_article_urls function. This parameter is intended to limit the recursion depth when fetching article URLs, but due to insecure coding practices, it is not properly enforced. An attacker can exploit this by triggering repeated recursive calls that exceed Python's recursion limit, causing excessive consumption of CPU and memory resources. This ultimately leads to the crashing of the Python process running the vulnerable code, resulting in service unavailability. The vulnerability affects versions up to and including v0.12.15, with no specific patch currently linked. The CVSS v3.0 base score is 7.5, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are reported in the wild yet, but the vulnerability is publicly disclosed and can be weaponized in denial-of-service attacks against services using this library.
Potential Impact
For European organizations utilizing the run-llama/llama_index library, particularly those integrating it into knowledge base or document processing applications, this vulnerability poses a significant risk of service disruption. The DoS attack can lead to downtime, impacting business continuity and user experience. Organizations relying on automated knowledge extraction or AI-driven document indexing could face interruptions, potentially affecting customer-facing services or internal workflows. Since the vulnerability does not compromise data confidentiality or integrity, the primary concern is availability loss. However, prolonged outages could indirectly affect compliance with service level agreements (SLAs) and regulatory requirements around operational resilience, especially in sectors like finance, healthcare, and critical infrastructure. The ease of exploitation without authentication or user interaction increases the threat level, as attackers can remotely trigger the vulnerability over the network. This could be leveraged in targeted attacks or as part of broader disruption campaigns.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first monitor for updates or patches from the run-llama/llama_index maintainers and apply them promptly once available. In the interim, developers should implement strict input validation and enforce recursion depth limits explicitly within the get_article_urls function to prevent uncontrolled recursion. Rate limiting and request throttling at the application or network level can reduce the risk of repeated exploit attempts. Deploying runtime monitoring tools to detect abnormal resource consumption patterns can provide early warning signs of exploitation. Additionally, isolating the vulnerable component in a sandboxed environment or container with resource limits (CPU and memory quotas) can minimize the impact of a successful attack. Network-level protections such as Web Application Firewalls (WAFs) configured to detect and block suspicious recursive request patterns can also be effective. Finally, conducting code reviews and security testing focused on recursion and resource consumption in similar modules can prevent analogous vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-1752: CWE-400 Uncontrolled Resource Consumption in run-llama run-llama/llama_index
Description
A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). The vulnerability arises due to inappropriate secure coding measures, specifically the lack of proper implementation of the max_depth parameter in the get_article_urls function. This allows an attacker to exhaust Python's recursion limit through repeated function calls, leading to resource consumption and ultimately crashing the Python process.
AI-Powered Analysis
Technical Analysis
CVE-2025-1752 is a Denial of Service (DoS) vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the run-llama/llama_index project, specifically within the KnowledgeBaseWebReader class. The vulnerability stems from improper handling of the max_depth parameter in the get_article_urls function. This parameter is intended to limit the recursion depth when fetching article URLs, but due to insecure coding practices, it is not properly enforced. An attacker can exploit this by triggering repeated recursive calls that exceed Python's recursion limit, causing excessive consumption of CPU and memory resources. This ultimately leads to the crashing of the Python process running the vulnerable code, resulting in service unavailability. The vulnerability affects versions up to and including v0.12.15, with no specific patch currently linked. The CVSS v3.0 base score is 7.5, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are reported in the wild yet, but the vulnerability is publicly disclosed and can be weaponized in denial-of-service attacks against services using this library.
Potential Impact
For European organizations utilizing the run-llama/llama_index library, particularly those integrating it into knowledge base or document processing applications, this vulnerability poses a significant risk of service disruption. The DoS attack can lead to downtime, impacting business continuity and user experience. Organizations relying on automated knowledge extraction or AI-driven document indexing could face interruptions, potentially affecting customer-facing services or internal workflows. Since the vulnerability does not compromise data confidentiality or integrity, the primary concern is availability loss. However, prolonged outages could indirectly affect compliance with service level agreements (SLAs) and regulatory requirements around operational resilience, especially in sectors like finance, healthcare, and critical infrastructure. The ease of exploitation without authentication or user interaction increases the threat level, as attackers can remotely trigger the vulnerability over the network. This could be leveraged in targeted attacks or as part of broader disruption campaigns.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first monitor for updates or patches from the run-llama/llama_index maintainers and apply them promptly once available. In the interim, developers should implement strict input validation and enforce recursion depth limits explicitly within the get_article_urls function to prevent uncontrolled recursion. Rate limiting and request throttling at the application or network level can reduce the risk of repeated exploit attempts. Deploying runtime monitoring tools to detect abnormal resource consumption patterns can provide early warning signs of exploitation. Additionally, isolating the vulnerable component in a sandboxed environment or container with resource limits (CPU and memory quotas) can minimize the impact of a successful attack. Network-level protections such as Web Application Firewalls (WAFs) configured to detect and block suspicious recursive request patterns can also be effective. Finally, conducting code reviews and security testing focused on recursion and resource consumption in similar modules can prevent analogous vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-02-27T11:24:38.795Z
- Cisa Enriched
- true
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6abd
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:32:16 AM
Last updated: 8/15/2025, 2:26:07 PM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.