Summary
The DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the Add Dynamic Partitions permission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials.
Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted.
Impact
Dagster OSS: Any user with access to the Dagster API can create dynamic partition keys. Organizations should assess exposure based on who has API access in their deployment. Dagster is typically deployed in trusted environments where users who can manage partitions already have equivalent database access through other means.
Dagster+: In most Dagster+ deployments using default permission sets, the Add Dynamic Partitions permission is granted to users with an Editor role or above, who typically already have the ability to modify the affected tables and the asset code that accesses them.
The vulnerability is most relevant in deployments where this permission has been granted independently of broader database access, such as certain multi-tenant or custom RBAC configurations. In those cases, an affected user could read or modify data within the databases accessible to the I/O manager, beyond what their role would otherwise permit. Organizations should review which users hold this permission and assess their exposure accordingly.
Remediation
Update to the patched versions listed above. No configuration changes or workarounds are required alongside the update. Only your Dagster code version needs to be updated; the Dagster+ agent/Dagster OSS daemon/webserver do not need to be updated.
The fix ensures that partition key values are properly escaped before inclusion in SQL queries across all affected I/O managers.
If you are unable to apply the update, manual workarounds are described here.
References
Summary
The DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers constructed SQL WHERE clauses by interpolating dynamic partition key values into queries without escaping. A user with the
Add Dynamic Partitionspermission could create a partition key that injects arbitrary SQL, which would execute against the target database backend under the I/O manager's credentials.Only deployments that use dynamic partitions are affected. Pipelines using static or time-window partitions are not impacted.
Impact
Dagster OSS: Any user with access to the Dagster API can create dynamic partition keys. Organizations should assess exposure based on who has API access in their deployment. Dagster is typically deployed in trusted environments where users who can manage partitions already have equivalent database access through other means.
Dagster+: In most Dagster+ deployments using default permission sets, the
Add Dynamic Partitionspermission is granted to users with an Editor role or above, who typically already have the ability to modify the affected tables and the asset code that accesses them.The vulnerability is most relevant in deployments where this permission has been granted independently of broader database access, such as certain multi-tenant or custom RBAC configurations. In those cases, an affected user could read or modify data within the databases accessible to the I/O manager, beyond what their role would otherwise permit. Organizations should review which users hold this permission and assess their exposure accordingly.
Remediation
Update to the patched versions listed above. No configuration changes or workarounds are required alongside the update. Only your Dagster code version needs to be updated; the Dagster+ agent/Dagster OSS daemon/webserver do not need to be updated.
The fix ensures that partition key values are properly escaped before inclusion in SQL queries across all affected I/O managers.
If you are unable to apply the update, manual workarounds are described here.
References