Two critical vulnerabilities have been identified in Kedro, a popular Python framework for data science projects. These vulnerabilities, CVE-2026-35167 and CVE-2026-35171, allow for path traversal and arbitrary code execution, respectively. Patches are available in Kedro version 1.3.0.
CVE-2026-35171 carries a CVSS score of 9.8, indicating a critical vulnerability with a high likelihood of exploitation and severe impact.
What is Kedro?
Path Traversal Vulnerability in Versioned Dataset Loading
High severity path traversal vulnerability.
The `_get_versioned_path()` method in Kedro constructs filesystem paths by directly interpolating user-supplied version strings without sanitization. This allows an attacker to use traversal sequences (e.g., `../`) within the version string to access files outside the intended versioned dataset directory.
How to fix CVE-2026-35167 in Kedro
Patch immediately- 1.Upgrade Kedro to version 1.3.0 or later.
pip install --upgrade kedroVerify with:
pip show kedroWorkaround: Validate version strings before passing them to DataCatalog or the CLI, ensuring they do not contain `..` segments, path separators, or absolute paths.
NextGuard automatically flags CVE-2026-35167 if Kedro appears in any of your monitored projects — no manual lookup required.
Arbitrary Code Execution via Malicious Logging Configuration
Critical Remote Code Execution vulnerability.
Kedro allows the logging configuration file path to be set via the `KEDRO_LOGGING_CONFIG` environment variable and loads it without validation. The logging configuration schema supports the `()` key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during application startup.
How to fix CVE-2026-35171 in Kedro
Patch immediately- 1.Upgrade Kedro to version 1.3.0 or later.
pip install --upgrade kedroVerify with:
pip show kedroWorkaround: If upgrading is not immediately possible, avoid allowing untrusted input to control the `KEDRO_LOGGING_CONFIG` environment variable, restrict write access to logging configuration files, and manually validate logging YAML.
NextGuard automatically flags CVE-2026-35171 if Kedro appears in any of your monitored projects — no manual lookup required.
Stay ahead of Python vulnerabilities
Proactively identify and mitigate risks in your Python projects. Continuous monitoring and dependency scanning are crucial for maintaining a secure development environment. monitor your python dependencies to ensure you're always protected.
Compare Your DependenciesFrequently asked questions
The vulnerabilities in Kedro highlight the importance of keeping your dependencies up-to-date and implementing robust security practices. Prompt patching is essential to protect your data science projects from potential exploitation. see all python vulnerabilities to stay informed about the latest threats.
Related topics