Home

Description

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. Prior to version 4.4.8, links generated with LaTeX typesetters in Markdown files and Markdown cells in JupyterLab and Jupyter Notebook did not include the noopener attribute. This is deemed to have no impact on the default installations. Theoretically users of third-party LaTeX-rendering extensions could find themselves vulnerable to reverse tabnabbing attacks if links generated by those extensions included target=_blank (no such extensions are known at time of writing) and they were to click on a link generated in LaTeX (typically visibly different from other links). This issue has been patched in version 4.4.8.

PUBLISHED Reserved 2025-09-22 | Published 2025-09-26 | Updated 2025-09-26 | Assigner GitHub_M




LOW: 2.1CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-1022: Use of Web Link to Untrusted Target with window.opener Access

Product status

< 4.4.8
affected

References

github.com/...terlab/security/advisories/GHSA-vvfj-2jqx-52jm

github.com/...ommit/88ef373039a8cc09f27d3814382a512d9033675c

cve.org (CVE-2025-59842)

nvd.nist.gov (CVE-2025-59842)

Download JSON