Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. jupyterlab
  4. ›
  5. CVE-2026-40171

CVE-2026-40171: Jupyter Notebook Vulnerable to Authentication Token Theft via CommandLinker XSS

April 30, 2026 (updated May 8, 2026)

A stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook allows attackers to steal authentication tokens from users who open malicious notebook files and interact with elements that the attacker can make look indistinguishable from legitimate controls (single click interaction).

The vulnerability enables complete account takeover through the Jupyter REST API, allowing the attacker to:

  1. Read all files
  2. Modify/create files
  3. Access running kernels and execute arbitrary code
  4. Create terminals for shell access

References

  • github.com/advisories/GHSA-rch3-82jr-f9w9
  • github.com/jupyter/notebook
  • github.com/jupyter/notebook/security/advisories/GHSA-rch3-82jr-f9w9
  • jupyterlab.readthedocs.io/en/latest/user/commands.html
  • nvd.nist.gov/vuln/detail/CVE-2026-40171

Code Behaviors & Features

Detect and mitigate CVE-2026-40171 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.5.7

Fixed versions

  • 4.5.7

Solution

Upgrade to version 4.5.7 or above.

Impact 6.8 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

pypi/jupyterlab/CVE-2026-40171.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:41 +0000.