This is reachable through multiple entry points: catalog.load(..., version=...), DataCatalog.from_config(..., load_versions=...), and the CLI via kedro run --load-versions=dataset:../../../secrets. An attacker who can influence the version string can force Kedro to load files from outside the intended version directory, enabling unauthorized file reads, data poisoning, or cross-tenant data access in shared environments. This vulnerability is fixed in 1.3.0.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6326-w46w-ppjw | Kedro: Path Traversal in versioned dataset loading via unsanitized version string |
Tue, 14 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation kedro |
|
| CPEs | cpe:2.3:a:linuxfoundation:kedro:*:*:*:*:*:python:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation kedro |
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kedro-org
Kedro-org kedro |
|
| Vendors & Products |
Kedro-org
Kedro-org kedro |
Mon, 06 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kedro is a toolbox for production-ready data science. Prior to 1.3.0, the _get_versioned_path() method in kedro/io/core.py constructs filesystem paths by directly interpolating user-supplied version strings without sanitization. Because version strings are used as path components, traversal sequences such as ../ are preserved and can escape the intended versioned dataset directory. This is reachable through multiple entry points: catalog.load(..., version=...), DataCatalog.from_config(..., load_versions=...), and the CLI via kedro run --load-versions=dataset:../../../secrets. An attacker who can influence the version string can force Kedro to load files from outside the intended version directory, enabling unauthorized file reads, data poisoning, or cross-tenant data access in shared environments. This vulnerability is fixed in 1.3.0. | |
| Title | Kedro has a path traversal in versioned dataset loading via unsanitized version string | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T14:36:34.218Z
Reserved: 2026-04-01T17:26:21.133Z
Link: CVE-2026-35167
Updated: 2026-04-07T14:36:30.403Z
Status : Analyzed
Published: 2026-04-06T18:16:43.217
Modified: 2026-04-14T15:26:03.083
Link: CVE-2026-35167
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:44:47Z
Github GHSA