JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. This vulnerability depends on user interaction by opening a malicious Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab version 4.0.11 has been patched. Users are advised to upgrade. Users unable to upgrade should disable the table of contents extension.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0248 JupyterLab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook and Architecture. This vulnerability depends on user interaction by opening a malicious Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab version 4.0.11 has been patched. Users are advised to upgrade. Users unable to upgrade should disable the table of contents extension.
Github GHSA Github GHSA GHSA-4m77-cmpx-vjc4 JupyterLab vulnerable to SXSS in Markdown Preview
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 30 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-05-30T14:25:05.056Z

Reserved: 2024-01-10T15:09:55.554Z

Link: CVE-2024-22420

cve-icon Vulnrichment

Updated: 2024-08-01T22:43:34.935Z

cve-icon NVD

Status : Modified

Published: 2024-01-19T21:15:09.667

Modified: 2024-11-21T08:56:15.203

Link: CVE-2024-22420

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.