Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.3
Dagster Allows Unauthorized Database Access via Dynamic Partition Keys
GHSA-mjw2-v2hm-wj34
Summary
Dagster's database integrations can be tricked into executing unauthorized SQL queries, potentially allowing users with permission to add dynamic partitions to access or modify sensitive data in connected databases. This affects users with API access or Editor roles in certain deployment configurations. Organizations should review their access controls and consider re-evaluating permissions for users with this capability.
What to do
- Update dagster-duckdb to version 0.29.1.
- Update dagster-snowflake to version 0.29.1.
- Update dagster-gcp to version 0.29.1.
- Update dagster to version 1.13.1.
- Update dagster-deltalake to version 0.29.1.
- Update dagster-snowflake-polars to version 0.29.1.
Affected software
| Ecosystem | Vendor | Product | Affected versions |
|---|---|---|---|
| pip | – | dagster-duckdb |
<= 0.29.0 Fix: upgrade to 0.29.1
|
| pip | – | dagster-snowflake |
<= 0.29.0 Fix: upgrade to 0.29.1
|
| pip | – | dagster-gcp |
<= 0.29.0 Fix: upgrade to 0.29.1
|
| pip | – | dagster |
<= 1.13.0 Fix: upgrade to 1.13.1
|
| pip | – | dagster-deltalake |
<= 0.29.0 Fix: upgrade to 0.29.1
|
| pip | – | dagster-snowflake-polars |
<= 0.29.0 Fix: upgrade to 0.29.1
|
Original title
Dagster Vulnerable to SQL Injection via Dynamic Partition Keys in Database I/O Manager Integrations
Original description
### Summary
The DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the `Add Dynamic Partitions` permission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials.
Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted.
### Impact
**Dagster OSS**: Any user with access to the Dagster API can create dynamic partition keys. Organizations should assess exposure based on who has API access in their deployment. Dagster is typically deployed in trusted environments where users who can manage partitions already have equivalent database access through other means.
**Dagster+**: In most Dagster+ deployments using default permission sets, the `Add Dynamic Partitions` permission is granted to users with an Editor role or above, who typically already have the ability to modify the affected tables and the asset code that accesses them.
The vulnerability is most relevant in deployments where this permission has been granted independently of broader database access, such as certain multi-tenant or custom RBAC configurations. In those cases, an affected user could read or modify data within the databases accessible to the I/O manager, beyond what their role would otherwise permit. Organizations should review which users hold this permission and assess their exposure accordingly.
### Remediation
**Update to the patched versions listed above.** No configuration changes or workarounds are required alongside the update. Only your Dagster code version needs to be updated; the Dagster+ agent/Dagster OSS daemon/webserver do not need to be updated.
The fix ensures that partition key values are properly escaped before inclusion in SQL queries across all affected I/O managers.
If you are unable to apply the update, manual workarounds are described [here](https://gist.github.com/gibsondan/6d0c483f8499a8b1cd460cddc9fd8f72).
The DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the `Add Dynamic Partitions` permission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials.
Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted.
### Impact
**Dagster OSS**: Any user with access to the Dagster API can create dynamic partition keys. Organizations should assess exposure based on who has API access in their deployment. Dagster is typically deployed in trusted environments where users who can manage partitions already have equivalent database access through other means.
**Dagster+**: In most Dagster+ deployments using default permission sets, the `Add Dynamic Partitions` permission is granted to users with an Editor role or above, who typically already have the ability to modify the affected tables and the asset code that accesses them.
The vulnerability is most relevant in deployments where this permission has been granted independently of broader database access, such as certain multi-tenant or custom RBAC configurations. In those cases, an affected user could read or modify data within the databases accessible to the I/O manager, beyond what their role would otherwise permit. Organizations should review which users hold this permission and assess their exposure accordingly.
### Remediation
**Update to the patched versions listed above.** No configuration changes or workarounds are required alongside the update. Only your Dagster code version needs to be updated; the Dagster+ agent/Dagster OSS daemon/webserver do not need to be updated.
The fix ensures that partition key values are properly escaped before inclusion in SQL queries across all affected I/O managers.
If you are unable to apply the update, manual workarounds are described [here](https://gist.github.com/gibsondan/6d0c483f8499a8b1cd460cddc9fd8f72).
ghsa CVSS3.1
8.3
Vulnerability type
CWE-89
SQL Injection
Published: 18 Apr 2026 · Updated: 18 Apr 2026 · First seen: 18 Apr 2026