Jupyterhub vulnerabilities
6 known vulnerabilities affecting jupyterhub/jupyterhub.
Total CVEs
6
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2026-33709MEDIUMCVSS 5.1fixed in 5.4.42026-04-03
CVE-2026-33709 [MEDIUM] CWE-601 CVE-2026-33709: JupyterHub is software that allows one to create a multi-user server for Jupyter notebooks. Prior to
JupyterHub is software that allows one to create a multi-user server for Jupyter notebooks. Prior to version 5.4.4, an open redirect vulnerability in JupyterHub allows attackers to construct links which, when clicked, take users to the JupyterHub login page, after which they are sent to an arbitrary attacker-controlled site outside JupyterHub instea
cvelistv5ghsanvdosv
CVE-2024-41942HIGHCVSS 7.2fixed in 4.1.6v>= 5.0.0, < 5.1.02024-08-08
CVE-2024-41942 [HIGH] CWE-274 CVE-2024-41942: JupyterHub is software that allows one to create a multi-user server for Jupyter notebooks. Prior to
JupyterHub is software that allows one to create a multi-user server for Jupyter notebooks. Prior to versions 4.1.6 and 5.1.0, if a user is granted the `admin:users` scope, they may escalate their own privileges by making themselves a full admin user. The impact is relatively small in that `admin:users` is already an extremely privileged scope only gr
cvelistv5ghsanvdosv
CVE-2024-28233MEDIUMCVSS 6.1fixed in 4.1.02024-03-27
CVE-2024-28233 [MEDIUM] CWE-79 CVE-2024-28233: JupyterHub is an open source multi-user server for Jupyter notebooks. By tricking a user into visiti
JupyterHub is an open source multi-user server for Jupyter notebooks. By tricking a user into visiting a malicious subdomain, the attacker can achieve an XSS directly affecting the former's session. More precisely, in the context of JupyterHub, this XSS could achieve full access to JupyterHub API and user's single-user server. The affected configurat
cvelistv5ghsanvdosv
CVE-2020-36191MEDIUMCVSS 4.5≥ 0, < 1.2.0b12022-05-24
CVE-2020-36191 [MEDIUM] CWE-352 Cross-Site Request Forgery in JupyterHub
Cross-Site Request Forgery in JupyterHub
JupyterHub 1.1.0 allows CSRF in the admin panel via a request that lacks an `_xsrf` field, as demonstrated by a /hub/api/user request (to add or remove a user account).
ghsaosv
CVE-2021-41247HIGHCVSS 7.5v>= 1.0.0, < 1.5.0 - jupyterhub (pip)fixed in 1.2.0 - jupyterhub (helm)2021-11-04
CVE-2021-41247 [HIGH] CWE-613 CVE-2021-41247: JupyterHub is an open source multi-user server for Jupyter notebooks. In affected versions users who
JupyterHub is an open source multi-user server for Jupyter notebooks. In affected versions users who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is
cvelistv5ghsanvdosv
CVE-2019-10255MEDIUM≥ 0, < 0.9.62019-04-02
CVE-2019-10255 [MEDIUM] CWE-601 Open Redirect vulnerability in jupyterhub and notebook
Open Redirect vulnerability in jupyterhub and notebook
An Open Redirect vulnerability for all browsers in Jupyter Notebook before 5.7.8 and some browsers (Chrome, Firefox) in JupyterHub before 0.9.6 allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected.
ghsaosv