CVE-2026-39378 — Path Traversal in Nbconvert
Severity
6.5MEDIUMNVD
EPSS
0.0%
top 89.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 21
Description
The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. In versions 6.5 through 7.17.0, when `HTMLExporter.embed_images=True`, nbconvert's markdown renderer allows arbitrary file read via path traversal in image references. A malicious notebook can exfiltrate sensitive files from the conversion host by embedding them as base64 data URIs in the output HTML. nbconvert 7.17.1 contains a fix. As a workaround, do not enable `HTMLExporter.embed_i…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages21 packages
🔴Vulnerability Details
1GHSA
▶
📋Vendor Advisories
1Red Hat
▶
💬Community
1Bugzilla▶
CVE-2026-39378 nbconvert: nbconvert: Sensitive file exfiltration via path traversal in image references↗2026-04-21