CVE-2025-3044: llama-index ArxivReader: MD5 collision corrupts training data

GHSA-p7j4-jwjf-5x9w MEDIUM CISA: TRACK*
Published July 7, 2025
CISO Take

If your AI pipelines use LlamaIndex to ingest arXiv papers for training or RAG knowledge bases, papers with hash-colliding titles silently overwrite each other — corrupting datasets without any error raised. This is a silent data integrity failure, not a loud exploit. Patch to llama-index-readers-papers 0.3.1 and re-audit any datasets built with the affected ArxivReader.

Risk Assessment

Low external exploitability in the traditional sense — no RCE, no auth bypass. However, the risk to AI-native teams is underrated: silent data corruption in training pipelines or RAG knowledge bases can degrade model quality or introduce subtle data poisoning without triggering any alert. CVSS 5.3 Medium is accurate for the base vulnerability, but the real risk to AI systems is higher because the failure mode is invisible. No active exploitation observed; EPSS 0.07% confirms low attacker interest for now.

Affected Systems

Package Ecosystem Vulnerable Range Patched
llama-index-readers-papers pip < 0.3.1 0.3.1
49.3K 229 dependents Pushed yesterday 87% patched ~50d to patch Full package profile →

Do you use llama-index-readers-papers? You're affected.

Severity & Risk

CVSS 3.1
5.3 / 10
EPSS
0.2%
chance of exploitation in 30 days
Higher than 46% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Moderate
Exploitation Confidence
medium
CISA SSVC: Public PoC
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C None
I Low
A None

Recommended Action

5 steps
  1. Patch immediately: upgrade llama-index-readers-papers to >= 0.3.1 (fixed in llama-index 0.12.28).

  2. Audit existing datasets: if you have corpora built with ArxivReader on affected versions, verify paper counts against expected totals and check for missing entries.

  3. Re-ingest affected datasets after patching to ensure completeness.

  4. Detection: compare file counts pre/post ingestion runs; add hash integrity checks (SHA-256) on downloaded files as a defense-in-depth measure.

  5. For RAG systems: validate knowledge base entry counts after ingestion jobs complete.

CISA SSVC Assessment

Decision Track*
Exploitation poc
Automatable Yes
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 10 - Data and Data Governance
ISO 42001
A.8.2 - Data for AI systems
NIST AI RMF
MANAGE 2.2 - Data Quality Management
OWASP LLM Top 10
LLM03 - Training Data Poisoning

Frequently Asked Questions

What is CVE-2025-3044?

If your AI pipelines use LlamaIndex to ingest arXiv papers for training or RAG knowledge bases, papers with hash-colliding titles silently overwrite each other — corrupting datasets without any error raised. This is a silent data integrity failure, not a loud exploit. Patch to llama-index-readers-papers 0.3.1 and re-audit any datasets built with the affected ArxivReader.

Is CVE-2025-3044 actively exploited?

No confirmed active exploitation of CVE-2025-3044 has been reported, but organizations should still patch proactively.

How to fix CVE-2025-3044?

1. Patch immediately: upgrade llama-index-readers-papers to >= 0.3.1 (fixed in llama-index 0.12.28). 2. Audit existing datasets: if you have corpora built with ArxivReader on affected versions, verify paper counts against expected totals and check for missing entries. 3. Re-ingest affected datasets after patching to ensure completeness. 4. Detection: compare file counts pre/post ingestion runs; add hash integrity checks (SHA-256) on downloaded files as a defense-in-depth measure. 5. For RAG systems: validate knowledge base entry counts after ingestion jobs complete.

What systems are affected by CVE-2025-3044?

This vulnerability affects the following AI/ML architecture patterns: RAG pipelines, training pipelines, data ingestion, LLM framework integrations.

What is the CVSS score for CVE-2025-3044?

CVE-2025-3044 has a CVSS v3.1 base score of 5.3 (MEDIUM). The EPSS exploitation probability is 0.23%.

Technical Details

NVD Description

A vulnerability in the ArxivReader class of the run-llama/llama_index repository allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in llama-index-readers-papers version 0.3.1 (in llama-index 0.12.28).

Exploitation Scenario

An adversary targeting an organization's AI training pipeline or RAG knowledge base could publish arXiv papers with titles carefully crafted to produce MD5 hash collisions with high-value legitimate papers (e.g., key security research or proprietary domain papers). When the victim's automated LlamaIndex pipeline re-ingests arXiv content, the adversary's paper silently replaces the legitimate one on disk. The victim's RAG system now retrieves adversary-controlled content in response to queries about the overwritten topic — a form of indirect RAG poisoning without compromising the victim's infrastructure directly.

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Timeline

Published
July 7, 2025
Last Modified
July 8, 2025
First Seen
March 24, 2026

Related Vulnerabilities