CVE-2025-51481

Local File Inclusion in dagster._grpc.impl.get_notebook_data in Dagster 1.10.14 allows attackers with access to the gRPC server to read arbitrary files by supplying path traversal sequences in the notebook_path field of ExternalNotebookData requests, bypassing the intended extension-based check.
References
Link Resource
https://github.com/dagster-io/dagster Product
https://github.com/dagster-io/dagster/pull/30002 Exploit Issue Tracking Vendor Advisory
https://www.gecko.security/blog/cve-2025-51481 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:dagsterlabs:dagster:1.10.14:*:*:*:*:*:*:*

History

07 Oct 2025, 20:34

Type Values Removed Values Added
CPE cpe:2.3:a:dagsterlabs:dagster:1.10.14:*:*:*:*:*:*:*
First Time Dagsterlabs dagster
Dagsterlabs
References () https://github.com/dagster-io/dagster - () https://github.com/dagster-io/dagster - Product
References () https://github.com/dagster-io/dagster/pull/30002 - () https://github.com/dagster-io/dagster/pull/30002 - Exploit, Issue Tracking, Vendor Advisory
References () https://www.gecko.security/blog/cve-2025-51481 - () https://www.gecko.security/blog/cve-2025-51481 - Exploit, Third Party Advisory

25 Jul 2025, 15:29

Type Values Removed Values Added
Summary
  • (es) La inclusión de archivos locales en dagster._grpc.impl.get_notebook_data en Dagster 1.10.14 permite a los atacantes con acceso al servidor gRPC leer archivos arbitrarios al proporcionar secuencias de Path Traversal en el campo notebook_path de las solicitudes ExternalNotebookData, omitiendo la verificación basada en extensión prevista.

22 Jul 2025, 19:15

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.6

22 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-22 17:15

Updated : 2025-10-07 20:34


NVD link : CVE-2025-51481

Mitre link : CVE-2025-51481

CVE.ORG link : CVE-2025-51481


JSON object : View

Products Affected

dagsterlabs

  • dagster
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')