CVE-2025-53000: nbconvert has an uncontrolled search path that leads to unauthorized code execution on Windows
(updated )
On Windows, converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a inkscape.bat file that defines a Windows batch script, capable of arbitrary code execution.
When a user runs jupyter nbconvert --to pdf on a notebook containing SVG output to a PDF on a Windows platform from this directory, the inkscape.bat file is run unexpectedly.
References
- github.com/advisories/GHSA-xm59-rqc7-hhvf
- github.com/jupyter/nbconvert
- github.com/jupyter/nbconvert/blob/4f61702f5c7524d8a3c4ac0d5fc33a6ac2fa36a7/nbconvert/preprocessors/svg2pdf.py
- github.com/jupyter/nbconvert/commit/c9ac1d1040459ed1ff9eb34e9918ce5a87cf9d71
- github.com/jupyter/nbconvert/issues/2258
- github.com/jupyter/nbconvert/releases/tag/v7.17.0
- github.com/jupyter/nbconvert/security/advisories/GHSA-xm59-rqc7-hhvf
- nvd.nist.gov/vuln/detail/CVE-2025-53000
- www.imperva.com/blog/code-execution-in-jupyter-notebook-exports
Code Behaviors & Features
Detect and mitigate CVE-2025-53000 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →