Medium severity6.1GHSA Advisory· Published May 5, 2026· Updated May 11, 2026
CVE-2025-61669
CVE-2025-61669
Description
Jupyter Server is the backend for Jupyter web applications. In jupyter_server versions through 2.17.0, the next query parameter in the login flow is insufficiently validated in LoginFormHandler._redirect_safe(), which allows redirects to arbitrary external domains via values such as ///example.com. An attacker can use a crafted login URL to redirect users to a malicious site and facilitate phishing attacks. This issue is fixed in version 2.18.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
jupyter-serverPyPI | < 2.18.0 | 2.18.0 |
Affected products
1- Range: <= 2.17.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/jupyter-server/jupyter_server/security/advisories/GHSA-qh7q-6qm3-653wnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-qh7q-6qm3-653wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-61669ghsaADVISORY
News mentions
0No linked articles in our index yet.