Ad

CVE-2026-29790

LOW CVSS 4.0: 2.0 EPSS 0.08%
Updated Mar 13, 2026
Getdbt
Parameter Value
CVSS 2.0 (LOW)
Affected Versions 1.35.0 — 1.37.3
Fixed In 1.34.2
Type CWE-22 (Path Traversal)
Vendor Getdbt
Public PoC No

dbt-common is the shared common utilities for dbt-core and adapter implementations use. Prior to versions 1.34.2 and 1.37.3, a path traversal vulnerability exists in dbt-common's safe_extract() function used when extracting tarball archives. The function uses os.path.commonprefix() to validate that extracted files remain within the intended destination directory.

However, commonprefix() compares paths character-by-character rather than by path components, allowing a malicious tarball to write files to sibling directories with matching name prefixes. This issue has been patched in versions 1.34.2 and 1.37.3.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
Present
Additional conditions required
Privileges Required
Low
Basic privileges needed
User Interaction
Active
User action required

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 2

Configuration From (including) Up to (excluding)
Getdbt Dbt-Common
cpe:2.3:a:getdbt:dbt-common:*:*:*:*:*:*:*:*
1.34.2
Getdbt Dbt-Common
cpe:2.3:a:getdbt:dbt-common:*:*:*:*:*:*:*:*
1.35.0 1.37.3