We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Local File Inclusion in dagster._grpc.impl.get_notebook_data in Dagster 1.10.14 allows attackers with access to the gRPC server to read arbitrary files by supplying path traversal sequences in the notebook_path field of ExternalNotebookData requests, bypassing the intended extension-based check.
Reserved 2025-06-16 | Published 2025-07-22 | Updated 2025-07-22 | Assigner mitregithub.com/dagster-io/dagster/pull/30002
www.gecko.security/blog/cve-2025-51481
Support options