Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7707: CWE-377 Insecure Temporary File in run-llama run-llama/llama_index

0
High
VulnerabilityCVE-2025-7707cvecve-2025-7707cwe-377
Published: Mon Oct 13 2025 (10/13/2025, 16:15:08 UTC)
Source: CVE Database V5
Vendor/Project: run-llama
Product: run-llama/llama_index

Description

The llama_index library version 0.12.33 sets the NLTK data directory to a subdirectory of the codebase by default, which is world-writable in multi-user environments. This configuration allows local users to overwrite, delete, or corrupt NLTK data files, leading to potential denial of service, data tampering, or privilege escalation. The vulnerability arises from the use of a shared cache directory instead of a user-specific one, making it susceptible to local data tampering and denial of service.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:46:52 UTC

Technical Analysis

The CVE-2025-7707 vulnerability affects the run-llama/llama_index library version 0.12.33, which by default sets the NLTK data directory to a subdirectory within the codebase that is world-writable in multi-user environments. This insecure temporary file handling (CWE-377) allows any local user on the system to overwrite, delete, or corrupt the shared NLTK data files. The root cause is the use of a shared cache directory rather than isolating data per user, which violates the principle of least privilege and exposes the system to local tampering. Exploitation requires local access but no user interaction, and the attacker can cause denial of service by corrupting essential data files, manipulate data integrity by tampering with NLTK resources, or escalate privileges by exploiting the corrupted environment. The CVSS v3.0 score of 7.1 reflects a high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacts on integrity and availability (I:H/A:H). Although no public exploits are currently known, the vulnerability poses a significant risk in shared environments such as multi-user servers or cloud instances where multiple users have access. The lack of a patch link suggests that remediation may require manual configuration changes or awaiting an official update from the vendor.

Potential Impact

For European organizations, especially those involved in AI research, software development, or data science using the run-llama/llama_index library, this vulnerability can lead to serious consequences. Local attackers or malicious insiders could exploit the insecure temporary file handling to corrupt or delete critical NLTK data, causing denial of service and disrupting AI workflows. Data tampering could undermine the integrity of AI models or outputs, potentially leading to incorrect decisions or compromised research results. Privilege escalation risks could allow attackers to gain higher system privileges, threatening broader system security. In multi-user environments common in universities, research institutions, and enterprises, the risk is amplified. The impact on availability and integrity could disrupt business operations and damage trust in AI systems. Compliance with European data protection regulations (e.g., GDPR) may also be affected if data integrity or availability is compromised.

Mitigation Recommendations

To mitigate CVE-2025-7707, organizations should immediately audit their use of the run-llama/llama_index library in multi-user environments. They should configure the NLTK data directory to use user-specific cache directories rather than a shared, world-writable location. This can be done by setting environment variables or modifying the library configuration to point to a secure, per-user path. File system permissions on the NLTK data directories must be restricted to prevent unauthorized write access, ensuring only the intended user or service account has write privileges. Monitoring file integrity of NLTK data files can help detect tampering attempts. Organizations should also isolate environments where the library runs, limiting local user access to trusted personnel only. Until an official patch is released, consider containerizing or sandboxing the application to reduce the attack surface. Finally, maintain awareness of vendor updates and apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2025-07-16T12:49:24.649Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ed28784a0d14fc5ab516ed

Added to database: 10/13/2025, 4:27:36 PM

Last enriched: 10/21/2025, 12:46:52 AM

Last updated: 12/3/2025, 11:29:17 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats