Description
Dagster is an orchestration platform for the development, production, and observation of data assets. Prior to Dagster Core version 1.13.1 and prior to Dagster libraries version 0.29.1, the DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the Add Dynamic Partitions permission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials. Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted. This issue has been patched in Dagster Core version 1.13.1 and Dagster libraries version 0.29.1.
Published: 2026-05-07
Score: 8.3 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises when Dagster’s I/O managers for DuckDB, Snowflake, BigQuery, and DeltaLake use unchecked string interpolation to build SQL WHERE clauses for dynamic partitions. An attacker who has the Add Dynamic Partitions permission can supply a specially crafted partition key that injects malicious SQL code. This injected code is executed against the target database with the credentials used by the I/O manager, potentially allowing data exfiltration, modification, or deletion. The flaw is a classic SQL‑injection weakness classified as CWE‑89. The supplied payload does not interact with Dagster’s own codebase beyond the generated SQL, but it can compromise the underlying database completely, impacting confidentiality, integrity, and availability of data managed by those databases.

Affected Systems

Vulnerable products are Dagster Core versions earlier than 1.13.1 and Dagster libraries earlier than 0.29.1. The attack can only affect deployments that employ dynamic partitioning; pipelines that use static or time‑window partitions are not impacted. The affected components are the DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers integrated with Dagster.

Risk and Exploitability

The CVSS score of 8.3 indicates high severity. The EPSS score is not available, so current exploitation probability cannot be quantified. The vulnerability is not listed in CISA’s KEV catalog. An attacker must first obtain Add Dynamic Partitions permission within a Dagster deployment, then supply a malicious partition key value to trigger the injection. No additional environmental prerequisites are described, implying that the flaw can be exploited by any user with the appropriate permission. Once triggered, the injected SQL runs with the database credential configured for the specific I/O manager, which can lead to full database compromise.

Generated by OpenCVE AI on May 7, 2026 at 14:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply Dagster Core version 1.13.1 or later and Dagster libraries version 0.29.1 or later to fix the query construction bug
  • Restrict the Add Dynamic Partitions permission to trusted administrators or remove dynamic partitioning entirely if it is not needed
  • Implement database‑level monitoring to detect anomalous or unexpected SQL execution patterns that could indicate injection attempts

Generated by OpenCVE AI on May 7, 2026 at 14:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mjw2-v2hm-wj34 Dagster Vulnerable to SQL Injection via Dynamic Partition Keys in Database I/O Manager Integrations
History

Thu, 07 May 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Dagsterlabs
Dagsterlabs dagster
Vendors & Products Dagsterlabs
Dagsterlabs dagster

Thu, 07 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description Dagster is an orchestration platform for the development, production, and observation of data assets. Prior to Dagster Core version 1.13.1 and prior to Dagster libraries version 0.29.1, the DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the Add Dynamic Partitions permission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials. Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted. This issue has been patched in Dagster Core version 1.13.1 and Dagster libraries version 0.29.1.
Title Dagster Vulnerable to SQL Injection via Dynamic Partition Keys in Database I/O Manager Integrations
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

Dagsterlabs Dagster
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-07T14:57:16.002Z

Reserved: 2026-04-20T16:14:19.008Z

Link: CVE-2026-41490

cve-icon Vulnrichment

Updated: 2026-05-07T14:55:17.202Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T14:16:02.527

Modified: 2026-05-07T15:50:18.183

Link: CVE-2026-41490

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T18:00:11Z

Weaknesses