Home

Description

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions 6.5 through 7.17.0 allow arbitrary file writes to locations outside the intended output directory when processing notebooks containing crafted cell attachment filenames. The `ExtractAttachmentsPreprocessor` passes attachment filenames directly to the filesystem without sanitization, enabling path traversal attacks. This vulnerability provides complete control over both the destination path and file extension. Version 7.17.1 contains a patch.

PUBLISHED Reserved 2026-04-06 | Published 2026-04-21 | Updated 2026-04-21 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-73: External Control of File Name or Path

Product status

>= 6.5, < 7.17.1
affected

References

github.com/...onvert/security/advisories/GHSA-4c99-qj7h-p3vg

github.com/jupyter/nbconvert/releases/tag/v7.17.1

cve.org (CVE-2026-39377)

nvd.nist.gov (CVE-2026-39377)

Download JSON