Skip to main content

CVE-2025-1752: CWE-400 Uncontrolled Resource Consumption in run-llama run-llama/llama_index

High
VulnerabilityCVE-2025-1752cvecve-2025-1752cwe-400
Published: Sat May 10 2025 (05/10/2025, 13:21:30 UTC)
Source: CVE
Vendor/Project: run-llama
Product: run-llama/llama_index

Description

A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). The vulnerability arises due to inappropriate secure coding measures, specifically the lack of proper implementation of the max_depth parameter in the get_article_urls function. This allows an attacker to exhaust Python's recursion limit through repeated function calls, leading to resource consumption and ultimately crashing the Python process.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:32:16 UTC

Technical Analysis

CVE-2025-1752 is a Denial of Service (DoS) vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the run-llama/llama_index project, specifically within the KnowledgeBaseWebReader class. The vulnerability stems from improper handling of the max_depth parameter in the get_article_urls function. This parameter is intended to limit the recursion depth when fetching article URLs, but due to insecure coding practices, it is not properly enforced. An attacker can exploit this by triggering repeated recursive calls that exceed Python's recursion limit, causing excessive consumption of CPU and memory resources. This ultimately leads to the crashing of the Python process running the vulnerable code, resulting in service unavailability. The vulnerability affects versions up to and including v0.12.15, with no specific patch currently linked. The CVSS v3.0 base score is 7.5, indicating a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are reported in the wild yet, but the vulnerability is publicly disclosed and can be weaponized in denial-of-service attacks against services using this library.

Potential Impact

For European organizations utilizing the run-llama/llama_index library, particularly those integrating it into knowledge base or document processing applications, this vulnerability poses a significant risk of service disruption. The DoS attack can lead to downtime, impacting business continuity and user experience. Organizations relying on automated knowledge extraction or AI-driven document indexing could face interruptions, potentially affecting customer-facing services or internal workflows. Since the vulnerability does not compromise data confidentiality or integrity, the primary concern is availability loss. However, prolonged outages could indirectly affect compliance with service level agreements (SLAs) and regulatory requirements around operational resilience, especially in sectors like finance, healthcare, and critical infrastructure. The ease of exploitation without authentication or user interaction increases the threat level, as attackers can remotely trigger the vulnerability over the network. This could be leveraged in targeted attacks or as part of broader disruption campaigns.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for updates or patches from the run-llama/llama_index maintainers and apply them promptly once available. In the interim, developers should implement strict input validation and enforce recursion depth limits explicitly within the get_article_urls function to prevent uncontrolled recursion. Rate limiting and request throttling at the application or network level can reduce the risk of repeated exploit attempts. Deploying runtime monitoring tools to detect abnormal resource consumption patterns can provide early warning signs of exploitation. Additionally, isolating the vulnerable component in a sandboxed environment or container with resource limits (CPU and memory quotas) can minimize the impact of a successful attack. Network-level protections such as Web Application Firewalls (WAFs) configured to detect and block suspicious recursive request patterns can also be effective. Finally, conducting code reviews and security testing focused on recursion and resource consumption in similar modules can prevent analogous vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2025-02-27T11:24:38.795Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6abd

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:32:16 AM

Last updated: 8/15/2025, 2:26:07 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats