Local File Inclusion in dagster._grpc.impl.get_notebook_data in Dagster 1.10.14 allows attackers with access to the gRPC server to read arbitrary files by supplying path traversal sequences in the notebook_path field of ExternalNotebookData requests, bypassing the intended extension-based check.
References
| Link | Resource |
|---|---|
| https://github.com/dagster-io/dagster | Product |
| https://github.com/dagster-io/dagster/pull/30002 | Exploit Issue Tracking Vendor Advisory |
| https://www.gecko.security/blog/cve-2025-51481 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-07-22 17:15
Updated : 2025-10-07 20:34
NVD link : CVE-2025-51481
Mitre link : CVE-2025-51481
CVE.ORG link : CVE-2025-51481
JSON object : View
Products Affected
dagsterlabs
- dagster
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
