CVE-2025-3044: llama-index ArxivReader: MD5 collision corrupts training data
GHSA-p7j4-jwjf-5x9w MEDIUM CISA: TRACK*If your AI pipelines use LlamaIndex to ingest arXiv papers for training or RAG knowledge bases, papers with hash-colliding titles silently overwrite each other — corrupting datasets without any error raised. This is a silent data integrity failure, not a loud exploit. Patch to llama-index-readers-papers 0.3.1 and re-audit any datasets built with the affected ArxivReader.
Risk Assessment
Low external exploitability in the traditional sense — no RCE, no auth bypass. However, the risk to AI-native teams is underrated: silent data corruption in training pipelines or RAG knowledge bases can degrade model quality or introduce subtle data poisoning without triggering any alert. CVSS 5.3 Medium is accurate for the base vulnerability, but the real risk to AI systems is higher because the failure mode is invisible. No active exploitation observed; EPSS 0.07% confirms low attacker interest for now.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| llama-index-readers-papers | pip | < 0.3.1 | 0.3.1 |
Do you use llama-index-readers-papers? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Patch immediately: upgrade llama-index-readers-papers to >= 0.3.1 (fixed in llama-index 0.12.28).
-
Audit existing datasets: if you have corpora built with ArxivReader on affected versions, verify paper counts against expected totals and check for missing entries.
-
Re-ingest affected datasets after patching to ensure completeness.
-
Detection: compare file counts pre/post ingestion runs; add hash integrity checks (SHA-256) on downloaded files as a defense-in-depth measure.
-
For RAG systems: validate knowledge base entry counts after ingestion jobs complete.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-3044?
If your AI pipelines use LlamaIndex to ingest arXiv papers for training or RAG knowledge bases, papers with hash-colliding titles silently overwrite each other — corrupting datasets without any error raised. This is a silent data integrity failure, not a loud exploit. Patch to llama-index-readers-papers 0.3.1 and re-audit any datasets built with the affected ArxivReader.
Is CVE-2025-3044 actively exploited?
No confirmed active exploitation of CVE-2025-3044 has been reported, but organizations should still patch proactively.
How to fix CVE-2025-3044?
1. Patch immediately: upgrade llama-index-readers-papers to >= 0.3.1 (fixed in llama-index 0.12.28). 2. Audit existing datasets: if you have corpora built with ArxivReader on affected versions, verify paper counts against expected totals and check for missing entries. 3. Re-ingest affected datasets after patching to ensure completeness. 4. Detection: compare file counts pre/post ingestion runs; add hash integrity checks (SHA-256) on downloaded files as a defense-in-depth measure. 5. For RAG systems: validate knowledge base entry counts after ingestion jobs complete.
What systems are affected by CVE-2025-3044?
This vulnerability affects the following AI/ML architecture patterns: RAG pipelines, training pipelines, data ingestion, LLM framework integrations.
What is the CVSS score for CVE-2025-3044?
CVE-2025-3044 has a CVSS v3.1 base score of 5.3 (MEDIUM). The EPSS exploitation probability is 0.23%.
Technical Details
NVD Description
A vulnerability in the ArxivReader class of the run-llama/llama_index repository allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in llama-index-readers-papers version 0.3.1 (in llama-index 0.12.28).
Exploitation Scenario
An adversary targeting an organization's AI training pipeline or RAG knowledge base could publish arXiv papers with titles carefully crafted to produce MD5 hash collisions with high-value legitimate papers (e.g., key security research or proprietary domain papers). When the victim's automated LlamaIndex pipeline re-ingests arXiv content, the adversary's paper silently replaces the legitimate one on disk. The victim's RAG system now retrieves adversary-controlled content in response to queries about the overwritten topic — a form of indirect RAG poisoning without compromising the victim's infrastructure directly.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N References
Timeline
Related Vulnerabilities
CVE-2024-12909 10.0 llama-index finchat: SQL injection enables RCE
Same package: llama-index CVE-2025-1793 9.8 llama_index: SQL injection in vector store integrations
Same package: llama-index CVE-2024-11958 9.8 llama-index DuckDB retriever: SQLi enables RCE
Same package: llama-index CVE-2025-1753 7.8 llama-index-cli: OS command injection enables RCE
Same package: llama-index CVE-2025-3225 7.5 llama-index Papers Loader: XML expansion DoS
Same package: llama-index
AI Threat Alert