CVE-2025-51481 – dagster
Package
Manager: pip
Name: dagster
Vulnerable Version: >=0 <1.10.16
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00014 pctl0.01736
Details
Dagster Local File Inclusion vulnerability Local File Inclusion in dagster._grpc.impl.get_notebook_data in Dagster 1.10.14 allows attackers with access to the gRPC server to read arbitrary files by supplying path traversal sequences in the notebook_path field of ExternalNotebookData requests, bypassing the intended extension-based check.
Metadata
Created: 2025-07-22T18:30:42Z
Modified: 2025-07-22T21:51:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-h7x8-jv97-fvvm/GHSA-h7x8-jv97-fvvm.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-h7x8-jv97-fvvm
Finding: F063
Auto approve: 1