CVE-2026-39377Path Traversal in Nbconvert

Severity
6.5MEDIUMNVD
EPSS
0.0%
top 86.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 21

Description

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions 6.5 through 7.17.0 allow arbitrary file writes to locations outside the intended output directory when processing notebooks containing crafted cell attachment filenames. The `ExtractAttachmentsPreprocessor` passes attachment filenames directly to the filesystem without sanitization, enabling path traversal attacks. This vulnerability provides complete control over both the des

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages21 packages

🔴Vulnerability Details

1
GHSA
nbconvert has an Arbitrary File Write via Path Traversal in Cell Attachment Filenames2026-04-21

📋Vendor Advisories

1
Red Hat
nbconvert: nbconvert: Arbitrary file write via crafted Jupyter notebook cell attachment filenames2026-04-21

💬Community

1
Bugzilla
CVE-2026-39377 nbconvert: nbconvert: Arbitrary file write via crafted Jupyter notebook cell attachment filenames2026-04-21
CVE-2026-39377 — Path Traversal in Jupyter Nbconvert | cvebase