{"api_version":"1","generated_at":"2026-05-12T23:15:49+00:00","cve":"CVE-2026-41490","urls":{"html":"https://cve.report/CVE-2026-41490","api":"https://cve.report/api/cve/CVE-2026-41490.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-41490","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-41490"},"summary":{"title":"Dagster Vulnerable to SQL Injection via Dynamic Partition Keys in Database I/O Manager Integrations","description":"Dagster is an orchestration platform for the development, production, and observation of data assets. Prior to Dagster Core version 1.13.1 and prior to Dagster libraries version 0.29.1, the DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the Add Dynamic Partitions permission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials. Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted. This issue has been patched in Dagster Core version 1.13.1 and Dagster libraries version 0.29.1.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-07 14:16:02","updated_at":"2026-05-07 15:50:18"},"problem_types":["CWE-89","CWE-89 CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.3","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.3","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"}}],"references":[{"url":"https://github.com/dagster-io/dagster/releases/tag/1.13.1","name":"https://github.com/dagster-io/dagster/releases/tag/1.13.1","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/dagster-io/dagster/security/advisories/GHSA-mjw2-v2hm-wj34","name":"https://github.com/dagster-io/dagster/security/advisories/GHSA-mjw2-v2hm-wj34","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-41490","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-41490","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"dagster-io","product":"dagster","version":"affected dagster < 1.13.1","platforms":[]},{"source":"CNA","vendor":"dagster-io","product":"dagster","version":"affected dagster-duckdb < 0.29.1","platforms":[]},{"source":"CNA","vendor":"dagster-io","product":"dagster","version":"affected dagster-snowflake < 0.29.1","platforms":[]},{"source":"CNA","vendor":"dagster-io","product":"dagster","version":"affected dagster-gcp < 0.29.1","platforms":[]},{"source":"CNA","vendor":"dagster-io","product":"dagster","version":"affected dagster-deltalake < 0.29.1","platforms":[]},{"source":"CNA","vendor":"dagster-io","product":"dagster","version":"affected dagster-snowflake-polars < 0.29.1","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"41490","cve":"CVE-2026-41490","epss":"0.000460000","percentile":"0.141400000","score_date":"2026-05-11","updated_at":"2026-05-12 00:01:18"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-41490","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-05-07T14:55:03.285694Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-05-07T14:57:16.002Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"dagster","vendor":"dagster-io","versions":[{"status":"affected","version":"dagster < 1.13.1"},{"status":"affected","version":"dagster-duckdb < 0.29.1"},{"status":"affected","version":"dagster-snowflake < 0.29.1"},{"status":"affected","version":"dagster-gcp < 0.29.1"},{"status":"affected","version":"dagster-deltalake < 0.29.1"},{"status":"affected","version":"dagster-snowflake-polars < 0.29.1"}]}],"descriptions":[{"lang":"en","value":"Dagster is an orchestration platform for the development, production, and observation of data assets. Prior to Dagster Core version 1.13.1 and prior to Dagster libraries version 0.29.1, the DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the Add Dynamic Partitions permission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials. Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted. This issue has been patched in Dagster Core version 1.13.1 and Dagster libraries version 0.29.1."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-07T13:15:15.883Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/dagster-io/dagster/security/advisories/GHSA-mjw2-v2hm-wj34","tags":["x_refsource_CONFIRM"],"url":"https://github.com/dagster-io/dagster/security/advisories/GHSA-mjw2-v2hm-wj34"},{"name":"https://github.com/dagster-io/dagster/releases/tag/1.13.1","tags":["x_refsource_MISC"],"url":"https://github.com/dagster-io/dagster/releases/tag/1.13.1"}],"source":{"advisory":"GHSA-mjw2-v2hm-wj34","discovery":"UNKNOWN"},"title":"Dagster Vulnerable to SQL Injection via Dynamic Partition Keys in Database I/O Manager Integrations"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-41490","datePublished":"2026-05-07T13:15:15.883Z","dateReserved":"2026-04-20T16:14:19.008Z","dateUpdated":"2026-05-07T14:57:16.002Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-07 14:16:02","lastModifiedDate":"2026-05-07 15:50:18","problem_types":["CWE-89","CWE-89 CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":5.5}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"41490","Ordinal":"1","Title":"Dagster Vulnerable to SQL Injection via Dynamic Partition Keys i","CVE":"CVE-2026-41490","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"41490","Ordinal":"1","NoteData":"Dagster is an orchestration platform for the development, production, and observation of data assets. Prior to Dagster Core version 1.13.1 and prior to Dagster libraries version 0.29.1, the DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the Add Dynamic Partitions permission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials. Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted. This issue has been patched in Dagster Core version 1.13.1 and Dagster libraries version 0.29.1.","Type":"Description","Title":"Dagster Vulnerable to SQL Injection via Dynamic Partition Keys i"}]}}}