Impact
The vulnerability is a path traversal flaw in the PartitionedDataset component of the Kedro-Datasets plugin. Partition IDs are concatenated directly into a base path without validation, allowing an attacker to supply .. components and write or overwrite files outside the intended dataset directory. This could replace critical system files or configuration files, opening a pathway to code execution or significant data tampering. The weakness is categorized as CWE‑22.
Affected Systems
The issue affects the kedro‑plugins package from kedro‑org, specifically the Kedro‑Datasets library in all releases prior to version 9.3.0. Any storage backend—local filesystem, Amazon S3, Google Cloud Storage, or others—uses the same partitioning logic, so users of PartitionedDataset across these backends are susceptible.
Risk and Exploitability
With a CVSS base score of 6.5 the flaw is considered moderate but potentially severe. No EPSS or KEV data is available. The likely attack vector is through any interface that accepts partition identifiers, meaning users who can control or influence the partition ID may trigger the flaw. Because the vulnerability permits arbitrary file write, exploitation could lead to privilege escalation or code execution if critical system files are overwritten. Prompt patching is strongly advised.
OpenCVE Enrichment
Github GHSA