Vulnerability Description
dbt-common is the shared common utilities for dbt-core and adapter implementations use. Prior to versions 1.34.2 and 1.37.3, a path traversal vulnerability exists in dbt-common's safe_extract() function used when extracting tarball archives. The function uses os.path.commonprefix() to validate that extracted files remain within the intended destination directory. However, commonprefix() compares paths character-by-character rather than by path components, allowing a malicious tarball to write files to sibling directories with matching name prefixes. This issue has been patched in versions 1.34.2 and 1.37.3.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getdbt | Dbt-Common | < 1.34.2 |
Related Weaknesses (CWE)
References
- https://github.com/dbt-labs/dbt-common/commit/e547954a48bac9394ef6eb98432e429dcePatch
- https://github.com/dbt-labs/dbt-common/security/advisories/GHSA-w75w-9qv4-j5xjMitigationVendor Advisory
- https://github.com/pypa/pip/pull/13777Issue Tracking
FAQ
What is CVE-2026-29790?
CVE-2026-29790 is a vulnerability with a CVSS score of 5.3 (MEDIUM). dbt-common is the shared common utilities for dbt-core and adapter implementations use. Prior to versions 1.34.2 and 1.37.3, a path traversal vulnerability exists in dbt-common's safe_extract() functi...
How severe is CVE-2026-29790?
CVE-2026-29790 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29790?
Check the references section above for vendor advisories and patch information. Affected products include: Getdbt Dbt-Common.