Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16771 | Jupyter Core on Windows Has Uncontrolled Search Path Element Local Privilege Escalation Vulnerability |
Github GHSA |
GHSA-33p9-3p43-82vq | Jupyter Core on Windows Has Uncontrolled Search Path Element Local Privilege Escalation Vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 08 Sep 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:jupyter:jupyter_core:*:*:*:*:*:*:*:* |
Tue, 03 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Jun 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jupyter Core is a package for the core common functionality of Jupyter projects. When using Jupyter Core prior to version 5.8.0 on Windows, the shared `%PROGRAMDATA%` directory is searched for configuration files (`SYSTEM_CONFIG_PATH` and `SYSTEM_JUPYTER_PATH`), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected `%PROGRAMDATA%` are affected. Users should upgrade to Jupyter Core version 5.8.0 or later to receive a patch. Some other mitigations are available. As administrator, modify the permissions on the `%PROGRAMDATA%` directory so it is not writable by unauthorized users; or as administrator, create the `%PROGRAMDATA%\jupyter` directory with appropriately restrictive permissions; or as user or administrator, set the `%PROGRAMDATA%` environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators _or_ the current user). | |
| Title | Jupyter Core on Windows Has Uncontrolled Search Path Element Local Privilege Escalation Vulnerability | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-03T17:34:46.033Z
Reserved: 2025-03-17T12:41:42.568Z
Link: CVE-2025-30167
Updated: 2025-06-03T17:34:42.419Z
Status : Analyzed
Published: 2025-06-03T17:15:21.520
Modified: 2025-09-08T21:55:04.750
Link: CVE-2025-30167
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:06Z
EUVD
Github GHSA