Description
Kedro-Datasets is a Kendo plugin providing data connectors. Prior to 9.3.0, PartitionedDataset in kedro-datasets was vulnerable to path traversal. Partition IDs were concatenated directly with the dataset base path without validation. An attacker or malicious input containing .. components in a partition ID could cause files to be written outside the configured dataset directory, potentially overwriting arbitrary files on the filesystem. Users of PartitionedDataset with any storage backend (local filesystem, S3, GCS, etc.) are affected. This vulnerability is fixed in 9.3.0.
Published: 2026-04-07
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a path traversal flaw in the PartitionedDataset component of the Kedro-Datasets plugin. Partition IDs are concatenated directly into a base path without validation, allowing an attacker to supply .. components and write or overwrite files outside the intended dataset directory. This could replace critical system files or configuration files, opening a pathway to code execution or significant data tampering. The weakness is categorized as CWE‑22.

Affected Systems

The issue affects the kedro‑plugins package from kedro‑org, specifically the Kedro‑Datasets library in all releases prior to version 9.3.0. Any storage backend—local filesystem, Amazon S3, Google Cloud Storage, or others—uses the same partitioning logic, so users of PartitionedDataset across these backends are susceptible.

Risk and Exploitability

With a CVSS base score of 6.5 the flaw is considered moderate but potentially severe. No EPSS or KEV data is available. The likely attack vector is through any interface that accepts partition identifiers, meaning users who can control or influence the partition ID may trigger the flaw. Because the vulnerability permits arbitrary file write, exploitation could lead to privilege escalation or code execution if critical system files are overwritten. Prompt patching is strongly advised.

Generated by OpenCVE AI on April 7, 2026 at 22:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade kedro-datasets to version 9.3.0 or later.

Generated by OpenCVE AI on April 7, 2026 at 22:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cjg8-h5qc-hrjv kedro-datasets has a path traversal vulnerability in PartitionedDataset that allows arbitrary file write
History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Kedro-org
Kedro-org kedro-plugins
Vendors & Products Kedro-org
Kedro-org kedro-plugins

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description Kedro-Datasets is a Kendo plugin providing data connectors. Prior to 9.3.0, PartitionedDataset in kedro-datasets was vulnerable to path traversal. Partition IDs were concatenated directly with the dataset base path without validation. An attacker or malicious input containing .. components in a partition ID could cause files to be written outside the configured dataset directory, potentially overwriting arbitrary files on the filesystem. Users of PartitionedDataset with any storage backend (local filesystem, S3, GCS, etc.) are affected. This vulnerability is fixed in 9.3.0.
Title Kedro-Datasets has a path traversal vulnerability in PartitionedDataset allows arbitrary file write
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Kedro-org Kedro-plugins
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T14:50:03.601Z

Reserved: 2026-04-02T20:49:44.454Z

Link: CVE-2026-35492

cve-icon Vulnrichment

Updated: 2026-04-08T14:49:56.021Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T16:16:27.620

Modified: 2026-04-08T21:27:00.663

Link: CVE-2026-35492

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:31Z

Weaknesses