The vulnerability lies in the PartitionedDataset class within the kedro-datasets package, which is susceptible to a path traversal attack. The root cause is the lack of input validation on partition IDs provided by the user. Specifically, the _partition_to_path method, which is called during the save operation, directly concatenated user-supplied partition IDs with the base path of the dataset. This allowed an attacker to use '..' sequences in the partition ID to navigate outside the intended directory and write files to arbitrary locations on the filesystem. A similar vulnerability existed in the _path_to_partition method used during the load operation, which was also patched to prevent reading from outside the dataset directory. The patch introduces a new method, _validate_partition_path, which normalizes and verifies that the resolved path is within the legitimate dataset directory before any file I/O is performed. This new validation method is now called from both _partition_to_path and _path_to_partition, effectively mitigating the path traversal vulnerability.