kedro-datasets has a path traversal vulnerability in PartitionedDataset that allows arbitrary file write
Moderate severity
GitHub Reviewed
Published
Apr 3, 2026
in
kedro-org/kedro-plugins
•
Updated Apr 7, 2026
Description
Published to the GitHub Advisory Database
Apr 6, 2026
Reviewed
Apr 6, 2026
Published by the National Vulnerability Database
Apr 7, 2026
Last updated
Apr 7, 2026
Impact
PartitionedDataset in kedro-datasets was vulnerable to path traversal. Partition IDs were concatenated directly with the dataset base path without validation. An attacker or malicious input containing .. components in a partition ID could cause files to be written outside the configured dataset directory, potentially overwriting arbitrary files on the filesystem.
Users of PartitionedDataset with any storage backend (local filesystem, S3, GCS, etc.) are affected.
Patches
Yes. The vulnerability has been patched in kedro-datasets version 9.3.0.
Users should upgrade to kedro-datasets >= 9.3.0. The fix normalizes constructed paths using
posixpath.normpathand validates that the resolved path remains within the dataset base directory before use, raising aDatasetErrorif the path escapes the base directory.Workarounds
Users who cannot upgrade should validate partition IDs before passing them to PartitionedDataset, ensuring they do not contain
..path components.References
Fix: kedro-org/kedro-plugins#1346
Report: kedro-org/kedro#5452
References