CVE-2026-39378: nbconvert has an Arbitrary File Read via Path Traversal in HTMLExporter Image Embedding
When HTMLExporter.embed_images=True, nbconvert’s markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-39378 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →