VYPR

PyPI package

jupyter-server

pkg:pypi/jupyter-server

Vulnerabilities (10)

  • CVE-2026-40934MedMay 5, 2026
    affected < 2.18.0fixed 2.18.0

    Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the secret used to sign authentication cookies is persisted to a static file at ~/.local/share/jupyter/runtime/jupyter_cookie_secret and is never rotated when a user changes their password

  • CVE-2026-40110HigMay 5, 2026
    affected < 2.18.0fixed 2.18.0

    Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the Origin header validation uses Python's re.match() to check incoming origins against the allow_origin_pat configuration value. Because re.match() only anchors at the start of the string

  • CVE-2026-35397HigMay 5, 2026
    affected < 2.18.0fixed 2.18.0

    Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, a path traversal vulnerability in the REST API allows an authenticated user to escape the configured root_dir and access sibling directories whose names begin with the same prefix as the r

  • CVE-2025-61669MedMay 5, 2026
    affected < 2.18.0fixed 2.18.0

    Jupyter Server is the backend for Jupyter web applications. In jupyter_server versions through 2.17.0, the next query parameter in the login flow is insufficiently validated in `LoginFormHandler._redirect_safe()`, which allows redirects to arbitrary external domains via values su

  • CVE-2023-49080Dec 4, 2023
    affected < 2.11.2fixed 2.11.2

    The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter notebook, JupyterLab, and Voila. Unhandled errors in API requests coming from an authenticated user include traceback information, which can includ

  • CVE-2023-39968Aug 28, 2023
    affected < 2.7.2fixed 2.7.2

    jupyter-server is the backend for Jupyter web applications. Open Redirect Vulnerability. Maliciously crafted login links to known Jupyter Servers can cause successful login or an already logged-in session to be redirected to arbitrary sites, which should be restricted to Jupyter

  • CVE-2023-40170Aug 28, 2023
    affected < 2.7.2fixed 2.7.2

    jupyter-server is the backend for Jupyter web applications. Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab". This issue has been addressed in commit

  • CVE-2022-29241Jun 14, 2022
    affected < 1.17.1fixed 1.17.1

    Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter Notebook. Prior to version 1.17.1, if notebook server is started with a value of `root_dir` that contains the starting user's home directory, then the

  • CVE-2022-24757Mar 23, 2022
    affected < 1.15.4fixed 1.15.4

    The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other hea

  • CVE-2020-26232Nov 24, 2020
    affected < 1.0.6fixed 1.0.6

    Jupyter Server before version 1.0.6 has an Open redirect vulnerability. A maliciously crafted link to a jupyter server could redirect the browser to a different website. All jupyter servers are technically affected, however, these maliciously crafted links can only be reasonably