Home

Description

Jupyter Server is the backend for Jupyter web applications. In jupyter_server versions through 2.17.0, the next query parameter in the login flow is insufficiently validated in `LoginFormHandler._redirect_safe()`, which allows redirects to arbitrary external domains via values such as `///example.com`. An attacker can use a crafted login URL to redirect users to a malicious site and facilitate phishing attacks. This issue is fixed in version 2.18.0.

PUBLISHED Reserved 2025-09-29 | Published 2026-05-05 | Updated 2026-05-05 | Assigner GitHub_M




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

<= 2.17.0
affected

References

github.com/...server/security/advisories/GHSA-qh7q-6qm3-653w exploit

github.com/...server/security/advisories/GHSA-qh7q-6qm3-653w

cve.org (CVE-2025-61669)

nvd.nist.gov (CVE-2025-61669)

Download JSON